Author of the publication

Fusion of Blockchain, IoT and Artificial Intelligence - A Survey.

, , , , , and . IEICE Trans. Inf. Syst., 105-D (2): 300-308 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved Sparse Coding Algorithm with Device-Free Localization Technique for Intrusion Detection and Monitoring., , , , and . Symmetry, 11 (5): 637 (2019)CCBRSN: A System with High Embedding Capacity for Covert Communication in Bitcoin., and . SEC, volume 580 of IFIP Advances in Information and Communication Technology, page 324-337. Springer, (2020)A MQTT-API-compatible IoT security-enhanced platform., , , , , , , , and . Int. J. Sens. Networks, 32 (1): 54-68 (2020)Special issue on security and privacy of blockchain technologies., , , , and . Int. J. Inf. Sec., 19 (3): 243-244 (2020)WebFed: Cross-platform Federated Learning Framework Based on Web Browser with Local Differential Privacy., , , and . CoRR, (2021)LDS-FL: Loss Differential Strategy Based Federated Learning for Privacy Preserving., , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)Am I eclipsed? A smart detector of eclipse attacks for Ethereum., , , , , , and . Comput. Secur., (2020)ANCS: Automatic NXDomain Classification System Based on Incremental Fuzzy Rough Sets Machine Learning., , , , , , and . IEEE Trans. Fuzzy Syst., 29 (4): 742-756 (2021)Universally Composable RFID Mutual Authentication., , , , and . IEEE Trans. Dependable Secur. Comput., 14 (1): 83-94 (2017)A Distributed Privacy-Preserving Association Rules Mining Scheme Using Frequent-Pattern Tree., and . ADMA, volume 5139 of Lecture Notes in Computer Science, page 170-181. Springer, (2008)