Author of the publication

Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks.

, , , , and . INFOCOM, page 900-908. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A mobile malware detection method using behavior features in network traffic., , , , , and . J. Netw. Comput. Appl., (2019)A First Look at Android Malware Traffic in First Few Minutes., , , , , , and . TrustCom/BigDataSE/ISPA (1), page 206-213. IEEE, (2015)Efficient Signature Generation for Classifying Cross-Architecture IoT Malware., , , , and . CNS, page 1-9. IEEE, (2018)Design and analysis of elastic handoff in cognitive cellular networks., , , , and . ICC, page 1-6. IEEE, (2017)Towards best secure coding practice for implementing SSL/TLS., and . INFOCOM Workshops, page 1-6. IEEE, (2018)Privacy-Preserving and Residential Context-Aware Online Learning for IoT-Enabled Energy Saving With Big Data Support in Smart Home Environment., , , , , , , and . IEEE Internet Things J., 6 (5): 7450-7468 (2019)Automatically predicting cyber attack preference with attributed heterogeneous attention networks and transductive learning., , , , , , and . Comput. Secur., (2021)Security Threat Mitigation For Smart Contracts: A Survey., , , , , and . CoRR, (2023)Security and Privacy in the Emerging Cyber-Physical World: A Survey., , , and . CoRR, (2021)A Comprehensive Survey on Pretrained Foundation Models: A History from BERT to ChatGPT., , , , , , , , , and 9 other author(s). CoRR, (2023)