From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Detecting Vehicle Anomaly in the Edge via Sensor Consistency and Frequency Characteristic., , , , , , , и . IEEE Trans. Veh. Technol., 68 (6): 5618-5628 (2019)An Intelligent Secure and Privacy-Preserving Parking Scheme Through Vehicular Communications., , , и . IEEE Trans. Veh. Technol., 59 (6): 2772-2785 (2010)Collective Memory for Detecting Nonconcurrent Clones: A Localized Approach for Global Topology and Identity Tracing in IoT Networks., , , , , , , , и . IEEE Internet Things J., 8 (7): 5762-5777 (2021)A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks., , , , и . IEEE Trans. Parallel Distributed Syst., 25 (1): 22-32 (2014)Grus: Toward Unified-memory-efficient High-performance Graph Processing on GPU., , , , , и . ACM Trans. Archit. Code Optim., 18 (2): 22:1-22:25 (2021)Provably secure robust threshold partial blind signature., , и . Sci. China Ser. F Inf. Sci., 49 (5): 604-615 (2006)An efficient dynamic-identity based signature scheme for secure network coding., , , , и . Comput. Networks, 54 (1): 28-40 (2010)Federated Data Cleaning: Collaborative and Privacy-Preserving Data Cleaning for Edge Intelligence., , , , , и . IEEE Internet Things J., 8 (8): 6757-6770 (2021)Security and privacy of collaborative spectrum sensing in cognitive radio networks., , , , и . IEEE Wirel. Commun., 19 (6): 106-112 (2012)Unleashing Cheapfakes through Trojan Plugins of Large Language Models., , , , , , , и . CoRR, (2023)