Author of the publication

Embedded Real-time System Trusted Protection Technology for Supply Chain Scenarios.

, , , and . ICCNS, page 64-68. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trusted connection architecture of Internet of Things oriented to perception layer., , , , , and . Int. J. Wirel. Mob. Comput., 12 (3): 224-231 (2017)An Efficient Malicious Code Detection System Based on Convolutional Neural Networks., , , , , and . CSAI/ICIMT, page 86-89. ACM, (2018)Fast identification method of malicious code based on extreme learning machine., , , and . ICSCA, page 55-60. ACM, (2022)Character-level domain name generation algorithm based on ED-GAN., , , and . ICSCA, page 198-205. ACM, (2022)Embedded Real-time System Trusted Protection Technology for Supply Chain Scenarios., , , and . ICCNS, page 64-68. ACM, (2022)Identity-based Linkable Blind Ring Signature Scheme on Lattice., , , , , , , and . ICCNS, page 51-57. ACM, (2022)Detection of Malicious Domain Names Based on Hidden Markov Model., , , , , and . DSC, page 659-664. IEEE, (2018)Efficient and Secure Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy., , , , , and . KSII Trans. Internet Inf. Syst., 11 (10): 5039-5061 (2017)A Heterogeneous IoT Node Authentication Scheme Based on Hybrid Blockchain and Trust Value., , , , , and . KSII Trans. Internet Inf. Syst., 14 (9): 3615-3638 (2020)Effective Clone Detection Model Based on Compressed Sensing in Clustered WSNs., , and . CSAI/ICIMT, page 468-473. ACM, (2018)