Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cloud Evidence Tracing System: An integrated forensics investigation system for large-scale public cloud platform., , , and . Digit. Investig., (2022)Incoherent Scattering of a Bessel Vortex Electromagnetic Beam From a Nonmagnetized Plasma., , , , and . IEEE Trans. Geosci. Remote. Sens., (2023)Detect and Prevent SIP Flooding Attacks in VoLTE by Utilizing a Two-Tier PFilter Design., , , , , and . IEICE Trans. Inf. Syst., 100-D (10): 2287-2294 (2017)Social network node influence maximization method combined with degree discount and local node optimization., , , and . Soc. Netw. Anal. Min., 11 (1): 31 (2021)Forensic analysis of WeChat on Android smartphones., , , , and . Digital Investigation, (2017)Compact Leakage-Free ID-Based Signature Scheme with Applications to Secret Handshakes., , , and . Wireless Personal Communications, 80 (4): 1671-1685 (2015)System Security Analysis of Different Link Proportions Between Nodes in the Cyber-Physical System Against Target Attack., , , , , , and . FCS, volume 1558 of Communications in Computer and Information Science, page 230-242. Springer, (2021)Efficient verification of data possession in cloud computing., and . CCIS, page 424-428. IEEE, (2016)Effects of Competition and Reputation on Auditing Cloud Service Provider's Security Commitment., and . IEEE Syst. J., 17 (1): 306-313 (March 2023)一种面向分布式异构网络的基于可信计算的信任模型 (Trust Model Based on Trusted Computing for Distributed Heterogeneous Networks)., , , , and . 计算机科学, 43 (10): 66-69 (2016)