Author of the publication

Generalized Intrusion Detection Mechanism for Empowered Intruders in Wireless Sensor Networks.

, , , , and . IEEE Access, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Authentication Scheme Based on Novel Construction of Hash Chains for Smart Mobile Devices., , , , and . Wirel. Commun. Mob. Comput., (2020)Cryptanalysis and Improvement of an Anonymous Batch Verification Scheme for Mobile Healthcare Crowd Sensing., , , and . IEEE Access, (2019)Computation-transferable authenticated key agreement protocol for smart healthcare., , , , , and . J. Syst. Archit., (2021)Research on the Measurement and Transmission Network System of New Launch Vehicle Based on Cloud Computing., , , , , , , and . QRS Companion, page 205-210. IEEE, (2017)Blockchain-based eHealth system for auditable EHRs manipulation in cloud environments., , , , and . J. Parallel Distributed Comput., (2021)An Improved Broadcast Authentication Protocol for Wireless Sensor Networks Based on the Self-Reinitializable Hash Chains., , , , , and . Secur. Commun. Networks, (2020)Classification and Recognition of Encrypted EEG Data Neural Network., , , , and . CoRR, (2020)Classification and recognition of encrypted EEG data based on neural network., , , , and . J. Inf. Secur. Appl., (2020)An Adaptive Secure Handover Authenticated Key Agreement for Multi-Server Architecture Communication Applications., , , , and . IEEE Trans. Veh. Technol., 71 (9): 9830-9839 (2022)Children's expression recognition based on a multiscale mixed attention mechanism., and . Int. J. Sens. Networks, 43 (2): 116-127 (2023)