From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Two-Stage PBFT Architecture With Trust and Reward Incentive Mechanism., , , и . IEEE Internet Things J., 10 (13): 11440-11452 (июля 2023)BOPE: Boundary Order-Preserving Encryption Scheme in Relational Database System., , , , и . IEEE Access, (2021)Transient performance analysis of smart grid with dynamic power distribution., , и . Inf. Sci., (2018)Towards Secure Runtime Customizable Trusted Execution Environment on FPGA-SoC., , , , , и . IEEE Trans. Computers, 73 (4): 1138-1151 (апреля 2024)An In-Depth Look at Forking-Based Attacks in Ethereum With PoW Consensus., , , и . IEEE Trans. Netw. Serv. Manag., 21 (1): 507-516 (февраля 2024)Is Stubborn Mining Severe in Imperfect GHOST Bitcoin-like Blockchains? Quantitative Analysis., , , , , и . CoRR, (2023)Towards interpreting ML-based automated malware detection models: a survey., и . CoRR, (2021)Towards Semi-Markov Model-based Dependability Evaluation of VM-based Multi-Domain Service Function Chain., , , , , и . CoRR, (2023)Deep-Dive Analysis of Selfish and Stubborn Mining in Bitcoin and Ethereum., , , и . CoRR, (2021)PA-iMFL: Communication-Efficient Privacy Amplification Method against Data Reconstruction Attack in Improved Multi-Layer Federated Learning., , , , , и . CoRR, (2023)