Author of the publication

MeHLDT: A multielement hash lock data transfer mechanism for on-chain and off-chain.

, , , , , and . Peer Peer Netw. Appl., 16 (4): 1927-1943 (August 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sub-diffraction-limit imaging by stochastic optical reconstruction microscopy (STORM), , , , , , , , , and 26 other author(s). volume 313. (2006)Dual estimation of attitude and parameters considering vibration based on GPS and IMU., , and . ASCC, page 1-6. IEEE, (2013)Maximizing the Influence Spread in Social Networks: A Learning-Automata-Driven Discrete Butterfly Optimization Algorithm., , , , and . Symmetry, 15 (1): 117 (2023)Data-Driven Model Predictive Control for Uncalibrated Visual Servoing., , and . Symmetry, 16 (1): 48 (2024)Adaptive Graph Representation for Clustering., , , , , and . IEEE Access, (2022)Smartphone-Based Pedestrian Dead Reckoning for 3D Indoor Positioning., , , , , and . Sensors, 21 (24): 8180 (2021)The Accessibility Design and Evaluation of Civil Aircraft Cockpit., , , and . AHFE (3), volume 1203 of Advances in Intelligent Systems and Computing, page 394-399. Springer, (2020)An Input-Aware Mimic Defense Theory and its Practice., , , , , and . CoRR, (2022)Three-way decisions model based on tolerance rough fuzzy set., , and . Int. J. Machine Learning & Cybernetics, 8 (1): 35-43 (2017)An initial study on the rank of input matrix for extreme learning machine., , , , and . Int. J. Machine Learning & Cybernetics, 9 (5): 867-879 (2018)