Author of the publication

Game-theory-based batch identification of invalid signatures in wireless mobile networks.

, , , and . INFOCOM, page 262-270. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards human-like and transhuman perception in AI 2.0: a review., , , , , , , , , and 3 other author(s). Frontiers Inf. Technol. Electron. Eng., 18 (1): 58-67 (2017)Session details: Session 2: Short Oral Session.. CEA@ICMR, ACM, (2019)Practical quantum digital signature with configurable decoy states., , , and . Quantum Inf. Process., 19 (5): 151 (2020)Improving the performance of decoy-state quantum digital signature with single-photon-added coherent sources., , , , and . Quantum Inf. Process., 19 (7): 198 (2020)Multiple description coding for multi-view video with adaptive redundancy allocation., , , and . ISPACS, page 181-185. IEEE, (2017)Changes in monthly flows in the Yangtze River, China – With special reference to the Three Gorges Dam, , , , , , and . Journal of Hydrology, (May 2016)The visual analysis of flow pattern for public bicycle system., , , , and . J. Vis. Lang. Comput., (2018)Optical orbital angular momentum from the curl of polarization, , , , , and . Physical Review Letters, (December 2010)Effectiveness of a phishing warning in field settings., , , , and . HotSoS, page 14:1-14:2. ACM, (2015)DDoS Attack Detection Method Based on Network Abnormal Behavior in Big Data Environment., , , , and . CoRR, (2019)