Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Clustering Collision Power Attack on RSA-CRT., , , , , and . Comput. Syst. Sci. Eng., 36 (2): 417-434 (2021)Robust Audio Watermarking Algorithm Based on Moving Average and DCT., , and . ICAIS (3), volume 11634 of Lecture Notes in Computer Science, page 419-429. Springer, (2019)An anonymous entropy-based location privacy protection scheme in mobile social networks., , , , and . EURASIP J. Wireless Comm. and Networking, (2019)Condition Evaluation of an Existing T-Beam Bridge Based on Neutral Axis Variation Monitored with Ultrasonic Coda Waves in a Network of Sensors., , , and . Sensors, 20 (14): 3895 (2020)A Secure Energy-Saving Communication and Encrypted Storage Model Based on RC4 for EHR., , and . IEEE Access, (2020)RcDT: Privacy Preservation Based on R-Constrained Dummy Trajectory in Mobile Social Networks., , , and . IEEE Access, (2019)Forecasting of Forex Time Series Data Based on Deep Learning., , , , , and . IIKI, volume 147 of Procedia Computer Science, page 647-652. Elsevier, (2018)Priced Timed Petri Nets Based Resource Allocation Strategy for Fog Computing., , and . IIKI, page 39-44. IEEE Computer Society, (2016)Unexpected Data Dependency Creation and Chaining: A New Attack to SDN., , , , , and . SP, page 1512-1526. IEEE, (2020)Reliable federated learning based on dual-reputation reverse auction mechanism in Internet of Things., , , , , and . Future Gener. Comput. Syst., (2024)