Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DOT-M: A Dual Offline Transaction Scheme of Central Bank Digital Currency for Trusted Mobile Devices., , and . NSS, volume 13787 of Lecture Notes in Computer Science, page 233-248. Springer, (2022)Bidirectional Underwater Blue-green Laser Communication Based on OFDM Modulation., , , , and . ICCNS, page 49-54. ACM, (2021)Editorial Special Section on Wireless Network Security and Privacy.. IEEE Trans. Vehicular Technology, 59 (2): 518 (2010)Your actions tell where you are: Uncovering Twitter users in a metropolitan area., , , and . CNS, page 424-432. IEEE, (2015)A secure hierarchical deduplication system in cloud storage., , , and . IWQoS, page 1-10. IEEE, (2016)Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance., , , and . INFOCOM, page 954-962. IEEE, (2009)A new tool wear monitoring method based on multi-scale PCA., , , , and . J. Intell. Manuf., 30 (1): 113-122 (2019)Supervoxel-based brain tumor segmentation with multimodal MRI images., , , , and . Signal Image Video Process., 16 (5): 1215-1223 (2022)Managing Wireless Sensor Networks with Supply Chain Strategy., , , and . QSHINE, page 59-66. IEEE Computer Society, (2004)mmLock: User Leaving Detection Against Data Theft via High-Quality mmWave Radar Imaging., , , , , and . ICCCN, page 1-10. IEEE, (2023)