Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unleashing Cheapfakes through Trojan Plugins of Large Language Models., , , , , , , and . CoRR, (2023)A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks., , , , and . Int. J. Secur. Networks, 3 (2): 122-132 (2008)A novel design for content delivery over software defined mobile social networks., , , and . IEEE Netw., 29 (4): 62-67 (2015)Detecting Vehicle Anomaly in the Edge via Sensor Consistency and Frequency Characteristic., , , , , , , and . IEEE Trans. Veh. Technol., 68 (6): 5618-5628 (2019)An Intelligent Secure and Privacy-Preserving Parking Scheme Through Vehicular Communications., , , and . IEEE Trans. Veh. Technol., 59 (6): 2772-2785 (2010)A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks., , , , and . IEEE Trans. Parallel Distributed Syst., 25 (1): 22-32 (2014)Grus: Toward Unified-memory-efficient High-performance Graph Processing on GPU., , , , , and . ACM Trans. Archit. Code Optim., 18 (2): 22:1-22:25 (2021)Security and privacy of collaborative spectrum sensing in cognitive radio networks., , , , and . IEEE Wirel. Commun., 19 (6): 106-112 (2012)Provably secure robust threshold partial blind signature., , and . Sci. China Ser. F Inf. Sci., 49 (5): 604-615 (2006)RAI2: Responsible Identity Audit Governing the Artificial Intelligence., , , , , and . NDSS, The Internet Society, (2023)