Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Localizing Access Point Through Simple Gesture., , , , and . IEEE Access, (2018)Large-Scale IoT Devices Firmware Identification Based on Weak Password., , , , and . IEEE Access, (2020)Towards Pattern-aware Privacy-preserving Real-time Data Collection., , , , , and . INFOCOM, page 109-118. IEEE, (2020)Proof of Vote: A High-Performance Consensus Protocol Based on Vote Mechanism & Consortium Blockchain., , , , and . HPCC/SmartCity/DSS, page 466-473. IEEE Computer Society, (2017)An Asymmetrical PWM Full-bridge converter with Current-doubler Rectifier for Medium voltage applications., , and . ICIT, page 1-6. IEEE, (2022)Malware Variants Detection Using Behavior Destructive Features., , , and . PAC, page 121-122. IEEE, (2018)Breaking Secure Aggregation: Label Leakage from Aggregated Gradients in Federated Learning., , , , , , and . INFOCOM, page 151-160. IEEE, (2024)The Iot Malware Classification Method Based On Visual Local Features., , , , , , and . ICNCC, page 47-53. ACM, (2021)Discovering Routers as Secondary Landmarks for Accurate IP Geolocation., , , , and . VTC Fall, page 1-5. IEEE, (2017)Optimization of Sampling Cell Size for Fingerprint Positioning., , , , and . Int. J. Distributed Sens. Networks, (2014)