From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secure Dynamic Searchable Symmetric Encryption With Constant Client Storage Cost., , , , и . IEEE Trans. Inf. Forensics Secur., (2021)Surveillant: a supervision mechanism between blockchains for efficient cross-chain verification., , , и . KSII Trans. Internet Inf. Syst., 16 (8): 2507-2528 (2022)HIAWare: Speculate Handwriting on Mobile Devices with Built-In Sensors., , , , и . ICICS (1), том 12918 из Lecture Notes in Computer Science, стр. 136-152. Springer, (2021)A Survey of Security Network Coding toward Various Attacks., , , , и . TrustCom, стр. 252-259. IEEE Computer Society, (2014)Charge-Depleting of the Batteries Makes Smartphones Recognizable., , , и . ICPADS, стр. 33-40. IEEE Computer Society, (2017)Model-agnostic adversarial example detection via high-frequency amplification., , , , , , и . Comput. Secur., (2024)Fault-Tolerant Topology Control Based on Artificial Immune Theory in WMNs., , , , , и . NSS, том 7873 из Lecture Notes in Computer Science, стр. 590-598. Springer, (2013)Biometrics-Authenticated Key Exchange for Secure Messaging., , , , , и . CCS, стр. 2618-2631. ACM, (2021)PonziGuard: Detecting Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph (CRBG)., , , , , , и . ICSE, стр. 64:1-64:12. ACM, (2024)MaskAuct: Seller-Autonomous Auction With Bidder Anonymity and Bidding Confidentiality., , , , , , и . IEEE Trans. Inf. Forensics Secur., (2024)