Author of the publication

A game-theoretic approach for channel security against active time-varying attacks based on artificial noise.

, , , and . J. Ambient Intell. Humaniz. Comput., 11 (6): 2215-2224 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Range Search Over Encrypted Uncertain IoT Outsourced Data., , , , and . IEEE Internet of Things Journal, 6 (2): 1520-1529 (2019)R-Dedup: Secure client-side deduplication for encrypted data without involving a third-party entity., , , and . J. Netw. Comput. Appl., (2020)A new construction of compressed sensing matrices for signal processing via vector spaces over finite fields., , , , and . Multim. Tools Appl., 78 (22): 31137-31161 (2019)A Game-Theory-Based Contract Mechanism to Facilitate Technology Spillover in Emerging Electric Vehicle Markets., , and . IEEE Trans. Engineering Management, (2024)Dynamic Defense Strategy Against DoS Attacks Over Vehicular Ad Hoc Networks Based on Port Hopping., , , and . IEEE Access, (2018)Efficient method to verify the integrity of data with supporting dynamic data in cloud computing., , , and . Sci. China Inf. Sci., 61 (11): 119101:1-119101:3 (2018)A Novel Semi-fragile Digital Watermarking Scheme for Scrambled Image Authentication and Restoration., , , , and . Mob. Networks Appl., 25 (1): 82-94 (2020)Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds., , , , , and . J. Medical Syst., 40 (11): 235:1-235:8 (2016)A Privacy Preserving Similarity Search Scheme over Encrypted High-Dimensional Data for Multiple Data Owners., , , and . ICCCS (2), volume 11064 of Lecture Notes in Computer Science, page 484-495. Springer, (2018)Privacy-preserving image search (PPIS): Secure classification and searching using convolutional neural network over large-scale encrypted medical images., , , and . Comput. Secur., (2020)