Author of the publication

Toward Blockchain-Based Spoofing Defense for Controlled Optimization of Phases in Traffic Signal System.

, , , , , , , , and . IEICE Trans. Inf. Syst., 105-D (2): 280-288 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of Interrupt Coalescing Schemes for Receive-Livelock Problem in Gigabit Ethernet Network Hosts., , , and . ICC, page 1835-1839. IEEE, (2008)Design and implementation of a portable TPM scheme for general-purpose trusted computing based on EFI., , , and . Frontiers Comput. Sci. China, 5 (2): 169-180 (2011)OB-IMA: out-of-the-box integrity measurement approach for guest virtual machines., , , and . Concurr. Comput. Pract. Exp., 27 (5): 1092-1109 (2015)Automated Identification of Sensitive Financial Data Based on the Topic Analysis., , and . Future Internet, 16 (2): 55 (February 2024)An Empirical Study on GAN-Based Traffic Congestion Attack Analysis: A Visualized Method., , , , , , , and . Wirel. Commun. Mob. Comput., (2020)New advances in securing cyberspace and curbing crowdturfing., , , and . Concurr. Comput. Pract. Exp., (2017)Random Forest Algorithm Based on Linear Privacy Budget Allocation., , , , and . J. Database Manag., 33 (2): 1-19 (2022)An optimal, strategy-proof scheme for multi-path traffic assignment in non-cooperative networks., , and . IEEE Trans. Wirel. Commun., 9 (3): 1012-1021 (2010)Private rank aggregation under local differential privacy., , and . Int. J. Intell. Syst., 35 (10): 1492-1519 (2020)Intrusion Prediction with System-call Sequence-to-Sequence Model., , , and . CoRR, (2018)