Author of the publication

A privacy-aware data dissemination scheme for smart grid with abnormal data traceability.

, , , and . Comput. Networks, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Classification of Malicious Software Behaviour Detection with Hybrid Set Based Feed Forward Neural Network., , , , and . ISNN (2), volume 6064 of Lecture Notes in Computer Science, page 556-565. Springer, (2010)A new VRSA-based pairing-free certificateless signature scheme for fog computing., , , , and . Concurr. Comput. Pract. Exp., (2019)A Data-Mining Approach for the Validation of Aerosol Retrievals., , , , and . IEEE Geosci. Remote. Sens. Lett., 5 (1): 113-117 (2008)Multi-Source Stego Detection with Low-Dimensional Textural Feature and Clustering Ensembles., , , , and . Symmetry, 10 (5): 128 (2018)An Accurate Ensemble Forecasting Approach for Highly Dynamic Cloud Workload With VMD and R-Transformer., , , , and . IEEE Access, (2020)A key management protocol with robust continuity for sensor networks., , , , and . Comput. Stand. Interfaces, 31 (4): 642-647 (2009)A privacy-aware data dissemination scheme for smart grid with abnormal data traceability., , , and . Comput. Networks, (2017)DPB-MA: Low-Latency Message Authentication Scheme Based on Distributed Verification and Priority in Vehicular Ad Hoc Network., , , , and . IEEE Trans. Veh. Technol., 72 (4): 5152-5166 (April 2023)System identification of hammerstein models by using backward shift algorithm., and . Appl. Math. Comput., (2022)Traffic sign detection algorithm based on feature expression enhancement., , , , and . Multim. Tools Appl., 80 (25): 33593-33614 (2021)