Author of the publication

Intelligent intrusion detection system in smart grid using computational intelligence and machine learning.

, , , , and . Trans. Emerg. Telecommun. Technol., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Threats to critical infrastructure from AI and human intelligence., , , and . J. Supercomput., 74 (10): 4865-4866 (2018)An Aggregate MapReduce Data Block Placement Strategy for Wireless IoT Edge Nodes in Smart Grid., , , , , , , , and . Wireless Personal Communications, 106 (4): 2225-2236 (2019)A Physical Capture Resistant Authentication Scheme for the Internet of Drones., , , , , , and . IEEE Commun. Stand. Mag., 5 (4): 62-67 (2021)Software-Defined GPU-CPU Empowered Efficient Wireless Federated Learning With Embedding Communication Coding for Beyond 5G., , , , and . IEEE Open J. Commun. Soc., (2023)Integrating Blockchain and Deep Learning Into Extremely Resource-Constrained IoT: An Energy-Saving Zero-Knowledge PoL Approach., , , , and . IEEE Internet Things J., 11 (3): 3881-3895 (February 2024)Millimeter-Wave Communication for Internet of Vehicles: Status, Challenges, and Perspectives., , , , , , , and . IEEE Internet Things J., 7 (9): 8525-8546 (2020)DITrust Chain: Towards Blockchain-Based Trust Models for Sustainable Healthcare IoT Systems., , , , , and . IEEE Access, (2020)A Review of NLIDB With Deep Learning: Findings, Challenges and Open Issues., , , , and . IEEE Access, (2022)Providing End-to-End Security Using Quantum Walks in IoT Networks., , , , , , , and . IEEE Access, (2020)On Detection of Sybil Attack in Large-Scale VANETs Using Spider-Monkey Technique., , , , , and . IEEE Access, (2018)