Author of the publication

The Research on Covert Communication Model Based on Blockchain: A Case Study of Ethereum's Whisper Protocol.

, , , , , , and . FCS, volume 1286 of Communications in Computer and Information Science, page 215-230. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure Random Key Distribution Scheme Against Node Replication Attacks in Industrial Wireless Sensor Systems., , , , , , , , and . IEEE Trans. Ind. Informatics, 16 (3): 2091-2101 (2020)Multi-Layer Network Local Community Detection Based on Influence Relation., , , , , and . IEEE Access, (2019)TT-SVD: An Efficient Sparse Decision-Making Model With Two-Way Trust Recommendation in the AI-Enabled IoT Systems., , , , , , , and . IEEE Internet Things J., 8 (12): 9559-9567 (2021)Heterogeneous Information Network Representation Learning Incorporating Community Structure., , , , , and . IEEE Access, (2022)TT-XSS: A novel taint tracking based dynamic detection framework for DOM Cross-Site Scripting., , , , and . J. Parallel Distributed Comput., 118 (Part): 100-106 (2018)SG-PBFT: A secure and highly efficient distributed blockchain PBFT consensus algorithm for intelligent Internet of vehicles., , , , , , , and . J. Parallel Distributed Comput., (2022)Using Sparse Representation to Detect Anomalies in Complex WSNs., , , , , , , and . ACM Trans. Intell. Syst. Technol., 10 (6): 64:1-64:18 (2019)Analysis of 5G academic Network based on graph representation learning method., , , , and . CoRR, (2021)A Lightweight Anonymous Mobile User Authentication Scheme for Smart Grid., , , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 821-827. IEEE, (2018)JOSP: Joint Optimization of Flow Path Scheduling and Virtual Network Function Placement for Delay-Sensitive Applications., , , , , , and . Mob. Networks Appl., 27 (4): 1642-1658 (2022)