Author of the publication

CSITime: Privacy-preserving human activity recognition using WiFi channel state information.

, , , , , , and . Neural Networks, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A system for building immunity in social networks., and . NaBIC, page 20-24. IEEE, (2012)Detecting and Mitigating Colluding Attacks in Connected Vehicles using Reinforcement Learning., , and . ICCE, page 1-6. IEEE, (2024)A Data Generation Workflow for Consensus-Based Connected Vehicle Security., , and . ICCE, page 1-2. IEEE, (2023)Bio-inspired machine learning based Wireless Sensor Network security., and . NaBIC, page 140-146. IEEE, (2013)Sociopsychological trust model for Wireless Sensor Networks., , and . J. Netw. Comput. Appl., (2016)A Practical Framework for Preventing Distracted Pedestrian-Related Incidents Using Wrist Wearables., , , , , and . IEEE Access, (2018)Multi-layer security scheme for implantable medical devices., , , , , , and . Neural Comput. Appl., 32 (9): 4347-4360 (2020)Neuro-fuzzy analytics in athlete development (NueroFATH): a machine learning approach., , , and . Neural Comput. Appl., 35 (33): 23697-23710 (November 2023)BGRL: Basal Ganglia inspired Reinforcement Learning based framework for deep brain stimulators., and . Artif. Intell. Medicine, (January 2024)TangleCV: A Distributed Ledger Technique for Secure Message Sharing in Connected Vehicles., , and . ACM Trans. Cyber Phys. Syst., 5 (1): 6:1-6:25 (2021)