Author of the publication

Analysis and research on network security and privacy security in ubiquitous electricity Internet of Things.

, , , , , and . Comput. Commun., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Digital Technology Search and New Venture Performance in Dynamic Environments: The Mediating Role of Competitive Advantage., , , and . J. Organ. End User Comput., 34 (7): 1-22 (2022)Bistatic PFA Parallel Algorithm Based on Double Chirp-Z Transforms and The Dsp Implementation., , , , , , , and . IGARSS, page 8118-8121. IEEE, (2023)The Environmental and Economic Effects of Trade Liberalization: A Computable General Equilibrium Modeling Approach., and . ICEE, page 596-599. IEEE Computer Society, (2010)SAR image change detection method based on intuitionistic fuzzy C-means clustering algorithm., , , , , , and . J. Intell. Fuzzy Syst., 38 (4): 3595-3604 (2020)FSVM: A Few-Shot Threat Detection Method for X-ray Security Images., , , , and . Sensors, 23 (8): 4069 (2023)Secure Communication via Chaotic Synchronization Based on Reservoir Computing., , and . IEEE Trans. Neural Networks Learn. Syst., 35 (1): 285-299 (January 2024)Research on the Impact of Information Security Certification and Concealment on Financial Performance: Impact of ISO 27001 and Concealment on Performance., , , and . J. Glob. Inf. Manag., 30 (3): 1-16 (2022)A Spatial Point Pattern Analysis of the 2003 SARS Epidemic in Beijing., , , and . EM-GIS, page 1:1-1:8. ACM, (2017)Degradation tendency prediction for pumped storage unit based on CNN-LSTM model., , , , , and . ISCID, page 294-298. IEEE, (2022)Design of a Biomimetic Control System for Tendon-driven Prosthetic Hand., , , , , , and . CBS, page 528-531. IEEE, (2018)