Author of the publication

Decentralized Policy-Hidden Fine-Grained Redaction in Blockchain-Based IoT Systems.

, , , , , , and . Sensors, 23 (16): 7105 (August 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimization of program recursive function calls analysis method., , , , and . Automatic Control and Computer Sciences, 50 (4): 253-259 (2016)Class Level Research on Modifying Information Transmission Path of the Cooperative Network Based on the Cohesion of Class., , , and . FSDM, volume 299 of Frontiers in Artificial Intelligence and Applications, page 494-510. IOS Press, (2017)An Efficient Confidentiality and Integrity Preserving Aggregation Protocol in Wireless Sensor Networks., , , and . Int. J. Distributed Sens. Networks, (2014)WHGDroid: Effective android malware detection based on weighted heterogeneous graph., , , , , and . J. Inf. Secur. Appl., (September 2023)Detecting anomalous traffic in the controlled network based on cross entropy and support vector machine., , and . IET Inf. Secur., 13 (2): 109-116 (2019)Privacy-Preserving and Traceable Federated Learning for data sharing in industrial IoT applications., , , , , and . Expert Syst. Appl., 213 (Part): 119036 (2023)A Detecting Method of Array Bounds Defects Based on Symbolic Execution., , , , and . NSS, volume 10394 of Lecture Notes in Computer Science, page 373-385. Springer, (2017)An Online Approach to Defeating Return-Oriented-Programming Attacks., , , , and . CSS, volume 10581 of Lecture Notes in Computer Science, page 236-247. Springer, (2017)A Novel Malware Detection Approach Based on Behavioral Semantic Analysis and LSTM Model., , and . ICCT, page 339-343. IEEE, (2021)A Practical Method to Confine Sensitive API Invocations on Commodity Hardware., , , , , and . NSS, volume 10394 of Lecture Notes in Computer Science, page 145-159. Springer, (2017)