Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ivermectin inhibits tumor metastasis by regulating the Wnt/β-catenin/integrin β1/FAK signaling pathway, , , , , , and . American journal of cancer research, 12 (10): 4502--4519 (October 2022)A new model for function areas layout in logistics park considering the impact of traffic organization., and . ITSC, page 2339-2345. IEEE, (2016)Revealing temporal features of attacks against smart grid., , , and . ISGT, page 1-6. IEEE, (2013)TCAM-based classification using divide-and-conquer for range expansion., , , and . ICCCN, page 1-8. IEEE, (2014)REAR: A radio environment adaptive routing protocol for CR Mobile Ad hoc Networks., , , and . ICT, page 112-117. IEEE, (2015)An efficient key management scheme for secure wireless multicast., , and . ICC, page 1236-1240. IEEE, (2002)Synthetic Forgery Attack against Continuous Keystroke Authentication Systems., and . ICCCN, page 1-7. IEEE, (2018)A new bandwidth-efficient multicast routing scheme for mobile Ad hoc Networks., , , and . WTS, page 1-7. IEEE, (2015)Bidirectional Range Extension for TCAM-Based Packet Classification., and . Networking, volume 6091 of Lecture Notes in Computer Science, page 351-361. Springer, (2010)Double Verifiably Encrypted Signature-Based Contract Signing Protocol., , and . ICICA (LNCS), volume 6377 of Lecture Notes in Computer Science, page 86-93. Springer, (2010)