Author of the publication

A sybil attack detection scheme for privacy-preserving mobile social networks.

, and . ICICS, page 1-5. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers., , , , and . IEEE Trans. Dependable Secur. Comput., 15 (1): 27-39 (2018)Designing efficient proxy signature schemes for mobile communication., , and . Sci. China Ser. F Inf. Sci., 51 (2): 183-195 (2008)Extended Moving Target Defense for AC State Estimation in Smart Grids., , , , and . IEEE Trans. Smart Grid, 14 (3): 2313-2325 (May 2023)An enhanced authenticated key agreement protocol for wireless mobile communication., , and . Comput. Stand. Interfaces, 29 (6): 647-652 (2007)Non-interactive deniable authentication protocol based on factoring., and . Comput. Stand. Interfaces, 27 (4): 401-405 (2005)Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system., , , and . J. Parallel Distributed Comput., (2017)Age of Information Minimization for Short-Packet Communications RSMA in Satellite-based IoT., , , , , and . VTC Fall, page 1-5. IEEE, (2023)PLPR: Towards Efficient and Privacy-Preserving LBSNs-Based POI Recommendation in Cloud., , , , and . ICC, page 1554-1559. IEEE, (2023)RISAC: Rate-splitting Multiple Access Enabled Integrated Sensing and Communication Systems., , , and . ICC, page 6449-6454. IEEE, (2023)Adversarial attack against scene recognition system for unmanned vehicles., , , , , and . ACM TUR-C, page 65:1-65:6. ACM, (2019)