Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Measurement Study Towards a Unified Firmware Updating Scheme for Legacy IoT Devices., , , , , , and . AsiaJCIS, page 9-15. IEEE, (2019)Attack Detection and Mitigation in MEC-Enabled 5G Networks for AIoT., , and . IEEE Internet Things Mag., 5 (3): 76-81 (2022)An Empirical Evaluation of Bluetooth-based Decentralized Contact Tracing in Crowds., , , , , , , , and . CoRR, (2020)ELF Analyzer Demo: Online Identification for IoT Malwares with Multiple Hardware Architectures., , , , and . SP (Workshops), page 126. IEEE, (2020)Non-invasive liquid level detection with dielectric capacitive method., , , , and . ISCE, page 117-118. IEEE, (2013)DDoS Attacks in Experimental LTE Networks., , and . AINA Workshops, volume 1150 of Advances in Intelligent Systems and Computing, page 545-553. Springer, (2020)Hash-Based Function Call Graph Fusion Method for IoT Malware Detection., , , and . WPMC, page 159-164. IEEE, (2023)Toward Large-Scale Rogue Base Station Attacks Using Container-Based Virtualization., , and . VTC Fall, page 1-6. IEEE, (2019)On Manipulating Routing Table to Realize Redirect Attacks in O-RAN by Malicious xApp., , , and . WPMC, page 288-292. IEEE, (2023)Conformance Testing for 5G O-RAN Entities through MEC., , and . CANDARW, page 330-336. IEEE, (2022)