Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Digital Twin-enabled Secure Charging Reservation for Electric Vehicle., , , , , , and . ICCC, page 1-6. IEEE, (2023)SecCDV: A Security Reference Architecture for Cybertwin-Driven 6G V2X., , , and . IEEE Trans. Veh. Technol., 71 (5): 4535-4550 (2022)Analysis on Instructional Features of Quality Video Open Course., , , , and . ICHL, volume 8038 of Lecture Notes in Computer Science, page 322-333. Springer, (2013)A Game Theoretic Approach for Data Asset Protection in Metaverse., , , , , and . MetaCom, page 458-465. IEEE, (2023)Long-term Incentive Mechanism for Federated Learning: A Dynamic Repeated Game Approach., , , , , and . PIMRC, page 1-6. IEEE, (2023)Radio signal modulation pattern recognition method., , , , , and . ICCCM, page 157-162. ACM, (2022)A Hybrid Deep Learning Model Considering External Factors for Accurate Short-Term Traffic Flow Prediction., , , , and . CNIOT, page 607-613. ACM, (2023)Platoon Handover Authentication in 5G-V2X : IEEE CNS 20 Poster., and . CNS, page 1-2. IEEE, (2020)A Lightweight and Secure Three-Factor Access Authentication Scheme in Metaverse., , , , , and . MetaCom, page 488-495. IEEE, (2023)Efficient Group Authentication and Key Agreement Scheme for Vehicular Digital Twin., , , and . ICCC, page 1-6. IEEE, (2023)