Author of the publication

Logical Tree Based Secure Rekeying Management for Smart Devices Groups in IoT Enabled WSN.

, , , , , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance Analysis and Evaluation for Active Antenna Arrays Under Three-Dimensional Wireless Channel Model., , , , , and . IEEE Access, (2018)Correlation Filter Tracking with Adaptive Proposal Selection for Accurate Scale Estimation., , , and . ICME, page 1816-1821. IEEE, (2019)Combining Deep Neural Networks and Classical Time Series Regression Models for Forecasting Patient Flows in Hong Kong., , , , , , , and . IEEE Access, (2019)A Parallel Recommender System Using a Collaborative Filtering Algorithm with Correntropy for Social Networks., , , , , , , and . IEEE Trans. Network Science and Engineering, 7 (1): 91-103 (2020)Fixed-time synchronization of fractional order memristive MAM neural networks by sliding mode control., , , , , , and . Neurocomputing, (2020)The Impact of Block Parameters on the Throughput and Security of Blockchains., , , and . ICBCT, page 13-18. ACM, (2020)Access Control Model Based on Role and Attribute and Its Implementation., , , , , and . CyberC, page 66-71. IEEE, (2016)Regression and classification using extreme learning machine based on L1-norm and L2-norm., , and . Neurocomputing, (2016)Timeliness online regularized extreme learning machine., , , and . Int. J. Machine Learning & Cybernetics, 9 (3): 465-476 (2018)On Threat Analysis of IoT-Based Systems: A Survey., , and . SmartIoT, page 205-212. IEEE, (2020)