Author of the publication

A hierarchical key management system applied in cloud-based smart grid.

, , , , , , , and . ICCC Workshops, page 22-26. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Clone Detection Based on Physical Layer Reputation for Proximity Service., , , , and . IEEE Access, (2019)Threshold-Free Physical Layer Authentication Based on Machine Learning for Industrial Wireless CPS., , , , , , and . IEEE Trans. Ind. Informatics, 15 (12): 6481-6491 (2019)Light-Weight Physical Layer Enhanced Security Schemes for 5G Wireless Networks., , , , , and . IEEE Netw., 33 (5): 126-133 (2019)Multiuser Physical Layer Authentication in Internet of Things With Data Augmentation., , , , , , and . IEEE Internet Things J., 7 (3): 2077-2088 (2020)Analysis of the physical layer security enhancing of wireless communication system under the random mobile., , , , , , and . IET Commun., 13 (9): 1164-1170 (2019)Outage Constrained Secrecy Rate Maximization for MIMOME Multicast Wiretap Channels., , , , and . IEEE Wirel. Commun. Lett., 8 (3): 657-660 (2019)Deep-Learning-Based Physical Layer Authentication for Industrial Wireless Sensor Networks., , , , , , , and . Sensors, 19 (11): 2440 (2019)Edge Intelligence based Co-training of CNN., , , , , and . ICCSE, page 830-834. IEEE, (2019)PLS-Based Secrecy Transmission for VANETs., , , , , , and . IEEE Trans. Veh. Technol., 69 (7): 7596-7608 (2020)Security Enhancement for Mobile Edge Computing Through Physical Layer Authentication., , , , , , , , and . IEEE Access, (2019)