Your selections:
- Afzaal, Hamra, Imran, Muhammad, Janjua, Muhammad
Deep learning and big data technologies for IoT security
- Amanullah, Mohamed, Habeeb, Riyaz, Nasaruddin, Fariza, Gani, Abdullah, Ahmed, Ejaz, Nainar, Abdul, Akim, Nazihah, Imran, Muhammad
Physical-layer security based mobile edge computing for emerging cyber physical systems
- Chen, Lunyuan, Tang, Shunpu, Balasubramanian, Venki, Xia, Junjuan, Zhou, Fasheng, Fan, Lisheng
- Khan, Anwar, Imran, Muhammad, Shoaib, Muhammad, Rahman, Atiq, Sama, Najmus
Deep reinforcement learning-based multi-objective edge server placement in Internet of Vehicles
- Lu, Jiawei, Jiang, Jielin, Balasubramanian, Venki, Khosravi, Mohammad, Xu, Xiaolong
- Sahraoui, Yesin, Kerrache, Chaker, Amadeo, Marica, Vegni, Anna, Korichi, Ahmed, Nebhen, Jamel, Imran, Muhammad
Artificial noise aided scheme to secure UAV-assisted internet of things with wireless power transfer
- Wang, Qubeijian, Dai, Hong-Ning, Li, Xuran, Shukla, Mahendra, Imran, Muhammad
Are you sure you would like to clear your session, including search history and login status?