Author of the publication

Real-Time Traffic Speed Estimation for Smart Cities with Spatial Temporal Data: A Gated Graph Attention Network Approach.

, , , , and . Big Data Res., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network flow analysis for detection and mitigation of Fraudulent Resource Consumption (FRC) attacks in multimedia cloud computing., and . Multimedia Tools Appl., 78 (4): 4267-4298 (2019)Compressive Sensing of Medical Images With Confidentially Homomorphic Aggregations., , , , , and . IEEE Internet of Things Journal, 6 (2): 1402-1409 (2019)Defending against Phishing Attacks: Taxonomy of Methods, Current Issues and Future Directions., , and . CoRR, (2017)Survey on DDoS Attacks and Defense Mechanisms in Cloud and Fog Computing., , and . IJESMA, 10 (3): 61-83 (2018)Efficient fingerprint matching on smart cards for high security and privacy in smart systems., , , and . Inf. Sci., (2019)Cooperative Mechanisms for Defending Distributed Denial of Service (DDoS) Attacks., and . Handbook of Computer Networks and Cyber Security, Springer, (2020)Efficient Compressed Ciphertext Length Scheme Using Multi-Authority CP-ABE for Hierarchical Attributes., , , and . IEEE Access, (2018)Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment., and . J. Ambient Intelligence and Humanized Computing, 10 (5): 1985-1997 (2019)Petri net-based verification of security protocol implementation in software evolution., , and . IJES, 10 (6): 503-517 (2018)Improving the performance of the needleman-wunsch algorithm using parallelization and vectorization techniques., , , , and . Multimedia Tools Appl., 78 (4): 3961-3977 (2019)