Author of the publication

EACMS: Emergency Access Control Management System for Personal Health Record Based on Blockchain.

, , , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CAD: Command-Level Anomaly Detection for Vehicle-Road Collaborative Charging Network., , , , and . IEEE Access, (2019)Low-cohesion differential privacy protection for industrial Internet., , , , , , and . J. Supercomput., 76 (11): 8450-8472 (2020)Detecting the research structure and topic trends of social media using static and dynamic probabilistic topic models., , , and . Aslib J. Inf. Manag., 75 (2): 215-245 (2023)Bandit-based data poisoning attack against federated learning for autonomous driving models., , , , and . Expert Syst. Appl., (October 2023)Intelligent Processing of Intrusion Detection Data., , , , , , and . IEEE Access, (2020)A Unified Learning Approach for Malicious Domain Name Detection., , , , , , , and . Axioms, 12 (5): 458 (May 2023)Social network user influence sense-making and dynamics prediction., , , , , and . Expert Syst. Appl., 41 (11): 5115-5124 (2014)Differentially private classification with decision tree ensemble., , , and . Appl. Soft Comput., (2018)Resource allocation based on quantum particle swarm optimization and RBF neural network for overlay cognitive OFDM System., , , , , and . Neurocomputing, (2016)ElasticSim: A Toolkit for Simulating Workflows with Cloud Resource Runtime Auto-Scaling and Stochastic Task Execution Times., , and . J. Grid Comput., 15 (2): 257-272 (2017)