2024
An efficient authentication scheme syncretizing physical unclonable function and revocable biometrics in Industrial Internet of Things.
J. King Saud Univ. Comput. Inf. Sci., 2024

2023
Antecedents and outcomes of artificial intelligence adoption and application in the workplace: the socio-technical system theory perspective.
Inf. Technol. People, 2023

How do remote workers perform during COVID-19 lockdowns? Examining professional isolation, cynicism and psychological hardiness.
Inf. Technol. People, 2023

2022
Trust-based secure directed diffusion routing protocol in WSN.
J. Ambient Intell. Humaniz. Comput., 2022

An anonymous authentication and key agreement protocol in smart living.
Comput. Commun., 2022

BCSE: Blockchain-based trusted service evaluation model over big data.
Big Data Min. Anal., 2022

Video Forensics for Object Removal Based on Darknet3D.
Proceedings of the Information and Communications Security - 24th International Conference, 2022

Shap-PreBiNT: A Sentiment Analysis Model Based on Optimized Transformer.
Proceedings of the Web and Big Data - 6th International Joint Conference, 2022

2021
ImpSuic: A quality updating rule in mixing coins with maximum utilities.
Int. J. Intell. Syst., 2021

LacminCC: lightweight anonymous communication model in cloud computing.
EURASIP J. Wirel. Commun. Netw., 2021

Network Security Situation Assessment Method Based on MHSA-FL Model.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021

2020
A game-theoretic approach of mixing different qualities of coins.
Int. J. Intell. Syst., 2020

Research on Blockchain-Based Identity Authentication Scheme in Social Networks.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

Self-paced learning based multi-kernel KRR for brain structure analysis in patients with different blood pressure levels.
Proceedings of the 13th International Congress on Image and Signal Processing, 2020

2019
3D Convolutional Networks Based Automatic Diagnosis of Alzheimer's Disease Using Structural MRI.
Proceedings of the 12th International Congress on Image and Signal Processing, 2019

A Security Detection Model for Selfish Mining Attack.
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019

2017
Maximized Traffic Offloading by Content Sharing in D2D Communication.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

2016
Data caching policies for device to device within cellular networks.
Proceedings of the 2016 International Conference on Intelligent Information Processing, 2016

2005
A low-complexity differential space-time transmission scheme for large numbers of receive antennas.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005