Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Analysis of Peer-to-Peer Network Security., and . GCA, page 131-150. CSREA Press, (2005)Construction of Near-Complementary Sequences with Low PMEPR for Peak Power Control in OFDM., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 95-A (11): 1881-1887 (2012)ERF-RTMDet: An Improved Small Object Detection Method in Remote Sensing Images., , , , , , and . Remote. Sens., 15 (23): 5575 (December 2023)Robust Video Object Segmentation via Propagating Seams and Matching Superpixels., , , , and . IEEE Access, (2020)Attack-Defense Quantification Based On Game-Theory., , and . CoRR, (2019)A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography., and . Comput. Commun., 31 (10): 2142-2149 (2008)On the Laplacian, the Kirchhoff Index, and the Number of Spanning Trees of the Linear Pentagonal Derivation Chain., , , and . Axioms, 11 (6): 278 (2022)DBSDS: A dual-blockchain security data sharing model with supervision and privacy-protection., , , , , and . Concurr. Comput. Pract. Exp., (2023)Generating Chaos with Saddle-Focus Homoclinic Orbit., , and . Int. J. Bifurc. Chaos, 34 (1): 2450011:1-2450011:12 (January 2024)The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved., , , , and . IEEE Internet Things J., 6 (2): 1606-1616 (2019)