Author of the publication

An Ethereum-Based Image Copyright Authentication Scheme.

, , , , , and . WISA, volume 13579 of Lecture Notes in Computer Science, page 724-731. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Minimizing the number of mobile chargers in a large-scale wireless rechargeable sensor network., and . WCNC, page 1297-1302. IEEE, (2015)Schedulability decision of charging missions in wireless rechargeable sensor networks., and . SECON, page 450-458. IEEE, (2014)Reaching Consensus for SDN Multi-controller Networks., and . HCC, volume 11956 of Lecture Notes in Computer Science, page 443-457. Springer, (2019)Predicting the Silent Data Corruption Vulnerability of Instructions in Programs., and . ICPADS, page 862-869. IEEE, (2019)Applying Bourdieu's Practice Theory to Social Commerce: toward a Dynamic Process-Oriented Research Framework., , , and . CONF-IRM, page 35. (2019)On Data Fusion and Lifetime Constraints in Wireless Sensor Networks., , , , and . ICC, page 3942-3947. IEEE, (2007)ECA-CTP: An Enhanced Congestion Avoidance Mechanism for the CTP Protocol in Wireless Sensor Networks., , and . Ad Hoc Sens. Wirel. Networks, 28 (3-4): 289-317 (2015)Dual Application of Speech Enhancement for Automatic Speech Recognition., , , and . CoRR, (2020)A Comprehensive Study and Analysis of the Third Generation Partnership Project's 5G New Radio for Vehicle-to-Everything Communication., , , , and . Future Internet, 16 (1): 21 (2024)A Dynamic Latent Structure With Time-Varying Parameters for Virtual Sensing of Industrial Process With Irregular Missing Data., , , and . IEEE Access, (2021)