Author of the publication

Dual chain authentication and key agreement protocol based on blockchain Technology in Edge Computing.

, , , and . HPCC/DSS/SmartCity/DependSys, page 396-401. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-dimensional optimization for approximate near-threshold computing., , , , and . Frontiers Inf. Technol. Electron. Eng., 21 (10): 1426-1441 (2020)基于HBase的支持频繁更新与多用户并发的R树 (R-tree for Frequent Updates and Multi-user Concurrent Accesses Based on HBase)., , , , and . 计算机科学, 45 (7): 42-52 (2018)Real-Time Estimation of Wind-Induced Pointing Error via Accelerations Measurement for Large Reflector Antenna., , and . IEEE Access, (2020)Discriminative human action recognition in the learned hierarchical manifold space., , , , and . Image Vis. Comput., 28 (5): 836-849 (2010)Local class-specific discriminant analysis with variable weighting and its application in fault diagnosis., , , and . Comput. Chem. Eng., (2020)Relay Node Placement in Wireless Sensor Networks: From Theory to Practice., , , and . IEEE Trans. Mob. Comput., 20 (4): 1602-1613 (2021)AGV semantic attack detection based on extended stochastic Petri net., , , and . Int. J. Sens. Networks, 42 (2): 113-124 (2023)CNN-RNN Based Intelligent Recommendation for Online Medical Pre-Diagnosis Support., , and . IEEE ACM Trans. Comput. Biol. Bioinform., 18 (3): 912-921 (2021)Hierarchical Adversarial Attacks Against Graph-Neural-Network-Based IoT Network Intrusion Detection System., , , , , and . IEEE Internet Things J., 9 (12): 9310-9319 (2022)A Trajectory Privacy-Preserving Scheme Based on Transition Matrix and Caching for IIoT., , , , and . IEEE Internet Things J., 11 (4): 5745-5756 (February 2024)