Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing Operating Systems Through Fine-Grained Kernel Access Limitation for IoT Systems., , , , , and . IEEE Internet Things J., 10 (6, March 15): 5378-5392 (2023)A New Approach Customizable Distributed Network Service Discovery System., , and . Wirel. Commun. Mob. Comput., (2021)Graph clustering using triangle-aware measures in large networks., , and . Inf. Sci., (2022)Uncovering overlapping community structure in static and dynamic networks., , and . Knowl. Based Syst., (2020)PSRide: Privacy-Preserving Shared Ride Matching for Online Ride Hailing Systems., , , , and . IEEE Trans. Dependable Secur. Comput., 18 (3): 1425-1440 (2021)Hail the Closest Driver on Roads: Privacy-Preserving Ride Matching in Online Ride Hailing Services., , and . Secur. Commun. Networks, (2020)Webpage visual feature extraction and similarity algorithm., , and . CIAT, page 80-85. ACM, (2020)Security Mechanisms to Defend against New Attacks on Software-Defined Radio., , , , , , and . ICNC, page 537-541. IEEE Computer Society, (2018)Effective Packet Number for 5G IM WeChat Application at Early Stage Traffic Classification., and . Mob. Inf. Syst., (2017)Checking Function-Level Kernel Control Flow Integrity for Cloud Computing., , , , , , and . IEEE Access, (2018)