Author of the publication

DarkTrans: A Blockchain-based Covert Communication Scheme with High Channel Capacity and Strong Concealment.

, , , , and . ICPADS, page 675-682. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

U-MEC: Energy-Efficient Mobile Edge Computing for IoT Applications in Ultra Dense Networks., , , , and . WASA, volume 10874 of Lecture Notes in Computer Science, page 622-634. Springer, (2018)N-Guide: Achieving Efficient Named Data Transmission in Smart Buildings., , , , and . WASA, volume 10874 of Lecture Notes in Computer Science, page 580-592. Springer, (2018)A Real-Time Identification System for VoIP Traffic in Large-Scale Networks., , , , and . HPCC/SmartCity/DSS, page 646-653. IEEE, (2019)EC-360: Speeding Up 360° Video Streaming Using Tile-based Online Erasure Coding., , , and . GLOBECOM, page 1-6. IEEE, (2021)Towards Full-scene Volumetric Video Streaming via Spatially Layered Representation and NeRF Generation., , , , , , and . NOSSDAV, page 22-28. ACM, (2024)Sophon: Super-Resolution Enhanced 360° Video Streaming with Visual Saliency-aware Prefetch., , , , and . ACM Multimedia, page 3124-3133. ACM, (2022)Genetic Algorithm Based Length Reduction of a Mobile BS Path in WSNs., , , , and . ACIS-ICIS, page 797-802. IEEE Computer Society, (2009)Measurements Study on the I/O Performance of Virtualized Cloud System., , , , and . NAS, page 298-302. IEEE Computer Society, (2012)StegEraser: Defending cybersecurity against malicious covert communications., , and . J. Comput. Secur., 32 (2): 117-139 (2024)CO-RTO: Achieving efficient data retransmission in VNDN by correlations implied in names., , , and . INFOCOM Workshops, page 366-371. IEEE, (2017)