Author of the publication

An Attribute-Isolated Secure Communication Architecture for Intelligent Connected Vehicles.

, , , and . IEEE Trans. Intell. Veh., 5 (4): 545-555 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Calibration of DEM models for fertilizer particles based on numerical simulations and granular experiments., , , , and . Comput. Electron. Agric., (2023)STC-IDS: Spatial-Temporal Correlation Feature Analyzing based Intrusion Detection System for Intelligent Connected Vehicles., , and . CoRR, (2022)Syntactic Ghost: An Imperceptible General-purpose Backdoor Attacks on Pre-trained Language Models., , , , , and . CoRR, (2024)Corrections to "Hardware-Assisted Transparent Tracing and Debugging on ARM"., and . IEEE Trans. Inf. Forensics Secur., (2021)Fine-CFI: Fine-Grained Control-Flow Integrity for Operating System Kernels., , , and . IEEE Trans. Inf. Forensics Secur., 13 (6): 1535-1550 (2018)An Attribute-Isolated Secure Communication Architecture for Intelligent Connected Vehicles., , , and . IEEE Trans. Intell. Veh., 5 (4): 545-555 (2020)User-friendly deniable storage for mobile devices., , , , , , and . Comput. Secur., (2018)A Framework to Secure Peripherals at Runtime., , , and . ESORICS (1), volume 8712 of Lecture Notes in Computer Science, page 219-238. Springer, (2014)Vacuum: Efficient and Assured Deletion Scheme for User Sensitive Data on Mobile Devices., , , , , and . IEEE Internet Things J., 9 (12): 10093-10107 (2022)Towards Transparent Debugging., , , and . IEEE Trans. Dependable Secur. Comput., 15 (2): 321-335 (2018)