Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Construction of the Enterprise-level RFID Security and Privacy Management Using Role-Based Key Management., , , and . SMC, page 3310-3317. IEEE, (2006)An Approach of Digital Rights Management for E-Museum with Enforce Context Constraints in RBAC Environments., , , and . SMC, page 1871-1878. IEEE, (2006)Feature enhancement modules applied to a feature pyramid network for object detection., , , , and . Pattern Anal. Appl., 26 (2): 617-629 (May 2023)ROLIG3A: Protecting Group Secret Key Generation Procedures against Malicious Attackers., , , , and . VTC Fall, page 1-5. IEEE, (2021)WSMeter: A Performance Evaluation Methodology for Google's Production Warehouse-Scale Computers., , , , , and . ASPLOS, page 549-563. ACM, (2018)cHRV Uncovering Daily Stress Dynamics Using Bio-Signal from Consumer Wearables., , , , and . MedInfo, volume 245 of Studies in Health Technology and Informatics, page 98-102. IOS Press, (2017)Application of Web Data Mining Based on the Neural Network Algorithms in E-Commerce.. ICEBE, page 509-512. IEEE Computer Society, (2010)Vulnerabilities of Physical Layer Secret Key Generation Against Environment Reconstruction Based Attacks., , , , , , and . IEEE Wirel. Commun. Lett., 9 (5): 693-697 (2020)Calibration in Collaborative Filtering Recommender Systems: a User-Centered Analysis., , , and . HT, page 197-206. ACM, (2020)Addressing Scalability in a Laboratory-Based Multihop Wireless Testbed., , , and . Mob. Networks Appl., 15 (3): 435-445 (2010)