Author of the publication

Study on Design Process for Joint Definition Phase of Avionics System Architecture based on Model.

, , , , and . IPEC, page 569-572. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TransPhys: Transformer-based unsupervised contrastive learning for remote heart rate measurement., , , , and . Biomed. Signal Process. Control., 86 (Part A): 105058 (September 2023)Provable Multiple-Replica Dynamic Data Possession for Big Data Storage in Cloud Computing., , and . Int. J. Netw. Secur., 20 (3): 575-584 (2018)Privacy-Preserving Face Recognition With Multi-Edge Assistance for Intelligent Security Systems., , , , and . IEEE Internet Things J., 10 (12): 10948-10958 (June 2023)Secure Edge-Aided Computations for Social Internet-of-Things Systems., , , , , , , and . IEEE Trans. Comput. Soc. Syst., 9 (1): 76-87 (2022)Towards real-time ship collision risk analysis: An improved R-TCR model considering target ship motion uncertainty., , , , , and . Reliab. Eng. Syst. Saf., (2022)Incorporating Model Based Safety Design into Development Process of Civil Aircraft Systems., and . ICCT, page 1291-1295. IEEE, (2019)Remote data possession checking with privacy-preserving authenticators for cloud storage., , , , , and . Future Gener. Comput. Syst., (2017)Study on Design Process for Joint Definition Phase of Avionics System Architecture based on Model., , , , and . IPEC, page 569-572. ACM, (2022)Security analysis and improvement of two verifiable multi-secret sharing schemes., , and . Int. J. Secur. Networks, 8 (4): 200-206 (2013)Forward-Secure Identity-Based Public-Key Encryption without Random Oracles., , , , and . Fundam. Informaticae, 111 (2): 241-256 (2011)