Author of the publication

FedComm: A Privacy-Enhanced and Efficient Authentication Protocol for Federated Learning in Vehicular Ad-Hoc Networks.

, , , , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Pinpointing Hidden IoT Devices via Spatial-temporal Traffic Fingerprinting., , , , , and . INFOCOM, page 894-903. IEEE, (2020)Cloud-based push-styled mobile botnets: a case study of exploiting the cloud to device messaging service., , , , , and . ACSAC, page 119-128. ACM, (2012)Vehicle Traffic Driven Camera Placement for Better Metropolis Security Surveillance., , , , , , and . CoRR, (2017)Inferring Hidden IoT Devices and User Interactions via Spatial-Temporal Traffic Fingerprinting., , , , , , and . IEEE/ACM Trans. Netw., 30 (1): 394-408 (2022)Querent-centric Domain Name System Modeling and Its Application in Passive Software Discovery., , and . DSA, page 152-160. IEEE, (2021)Taming energy cost of disk encryption software on data-intensive mobile devices., , , , , and . Future Gener. Comput. Syst., (2020)PackerGrind: An Adaptive Unpacking System for Android Apps., , , , , , and . IEEE Trans. Software Eng., 48 (2): 551-570 (2022)Taming Energy Cost of Disk Encryption Software on Data-Intensive Mobile Devices., , , , , and . FNC/MobiSPC, volume 94 of Procedia Computer Science, page 83-90. Elsevier, (2016)Boosting practicality of DNS cache probing: A general estimator based on Bayesian forecasting., , , and . ICC, page 2540-2544. IEEE, (2013)Protecting internet infrastructure against link flooding attacks: A techno-economic perspective., , , , and . Inf. Sci., (2019)