Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Consensus of delayed multi-agent dynamical systems with stochastic perturbation via impulsive approach., , , and . Neural Comput. Appl., 28 (S-1): 647-657 (2017)A parallel matching algorithm based on order relation for HLA data distribution management., , , and . Int. J. Model. Simul. Sci. Comput., 6 (2): 1540002:1-1540002:15 (2015)A Three-Factor Based Trust Model for Anonymous Bacon Message in VANETs., , , and . IEEE Trans. Veh. Technol., 72 (9): 11304-11317 (September 2023)Deep CNNs With Self-Attention for Speaker Identification., , and . IEEE Access, (2019)A Verifiable $(t, n)$ Threshold Quantum State Sharing Against Denial Attack., , , and . IEEE Access, (2019)Routing Attribute Data Mining Based on Rough Set Theory., , , and . ADMA, volume 3584 of Lecture Notes in Computer Science, page 276-283. Springer, (2005)Efficient Privacy-Preserving Dual Authentication and Key Agreement Scheme for Secure V2V Communications in an IoV Paradigm., , and . IEEE Trans. Intell. Transp. Syst., 18 (10): 2740-2749 (2017)Cryptanalysis and improvement of verifiable quantum (k, n) secret sharing., and . Quantum Inf. Process., 15 (2): 851-868 (2016)Generalized k-core percolation on higher-order dependent networks., , , , , and . Appl. Math. Comput., (2022)Dependent Misconfigurations in 5G/4.5G Radio Resource Control., , , , , and . PACMNET, 1 (CoNEXT1): 2:1-2:20 (2023)