Author of the publication

一种可检测数据完整性的安全数据聚合协议 (Integrity-checking Security Data Aggregation Protocol).

, , , , and . 计算机科学, 43 (Z6): 353-356 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research on the access network and MAC technique for beyond 3G systems., , , and . IEEE Wirel. Commun., 14 (2): 57-61 (2007)StegoNote: Steganography in Guitar Music Using Note Modulation., , , , , , and . Int. J. Netw. Secur., 22 (1): 68-79 (2020)An Adaptive Adversarial Patch-Generating Algorithm for Defending against the Intelligent Low, Slow, and Small Target., , , , , , , and . Remote. Sens., 15 (5): 1439 (March 2023)Analysis of temporal noise in CMOS photodiode active pixel sensor., , and . IEEE J. Solid State Circuits, 36 (1): 92-101 (2001)Promising techniques for anomaly detection on network traffic., , and . Comput. Sci. Inf. Syst., 14 (3): 597-609 (2017)Vulnerability analysis of public transit systems from the perspective of urban residential communities., , , , and . Reliab. Eng. Syst. Saf., (2019)An Evolutionary Game Theoretic Framework for Femtocell Radio Resource Management., , , and . IEEE Trans. Wirel. Commun., 14 (11): 6365-6376 (2015)Research on robot optimal path planning method based on improved ant colony algorithm.. Int. J. Comput. Sci. Math., 13 (1): 80-92 (2021)Detail texture detection based on Yolov4-tiny combined with attention mechanism and bicubic interpolation., , and . IET Image Process., 15 (12): 2736-2748 (2021)Social learning differential evolution., , , , and . Inf. Sci., (2018)