Your selections:
Robust malware defense in industrial IoT applications using machine learning with selective adversarial samples
- Khoda, Mahbub, Imam, Tasadduq, Kamruzzaman, Joarder, Gondal, Iqbal, Rahman, Ashfaqur
Provisioning delay sensitive service in cognitive radio networks with multiple radio interfaces
- Hasan, Rashidul, Murshed, Manzur
Predicting Hot-Spots in distributed cloud databases using association rule mining
- Kaml, Joarder, Murshed, Manzur, Gaber, Mohamed
Frame interpolation for cloud-based mobile video streaming
- Usman, Muhammad, Xiangjian, He, Kin-Man, Lam, Min, Xu, Bokhari, Syed, Jinjun, Chen
Anti-analysis trends in banking malware
P2DCA: A Privacy-preserving-based data collection and analysis framework for IoMT applications
- Usman, Muhammad, Jan, Mian, He, Xiangjian, Chen, Jinjun
Error concealment for cloud-based and scalable video coding of hd videos
- Usman, Muhammad, He, Xiangjian, Lam, Kin-Man, Xu, Min, Bokhari, Syed, Chen, Jinjun, Jan, Mian
Are you sure you would like to clear your session, including search history and login status?