Author of the publication

The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved.

, , , , and . IEEE Internet Things J., 6 (2): 1606-1616 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Multi-phase k-anonymity Algorithm Based on Clustering Techniques., , and . ISCTCS, volume 320 of Communications in Computer and Information Science, page 365-372. Springer, (2012)Remarks on the logarithmical regularity criterion of the supercritical surface quasi-geostrophic equation in Morrey spaces., and . Appl. Math. Lett., (2015)Link-based hidden attribute discovery for objects on Web., , , and . EDBT, page 473-484. ACM, (2011)Efficient Non-Blocking Top-k Query Processing in Distributed Networks., , and . DASFAA, volume 3882 of Lecture Notes in Computer Science, page 880-889. Springer, (2006)Image Aesthetics Assessment Using Composite Features from off-the-Shelf Deep Models., , and . CoRR, (2019)Construction of Cyber Range Network Security Indication System Based on Deep Learning., , and . DSC, page 495-502. IEEE, (2019)A Hybrid Algorithm for Web Document Clustering Based on Frequent Term Sets and k-Means., , , and . APWeb/WAIM Workshops, volume 4537 of Lecture Notes in Computer Science, page 198-203. Springer, (2007)A Practice in Facilitating Service-Oriented Inter-Enterprise Application Integration., , , and . TES, volume 3324 of Lecture Notes in Computer Science, page 122-135. Springer, (2004)Continuous Adaptive Outlier Detection on Distributed Data Streams., , , , and . HPCC, volume 4782 of Lecture Notes in Computer Science, page 74-85. Springer, (2007)Enhancement of Weakly Illuminated Images by Deep Fusion Networks., , and . ICIP, page 924-928. IEEE, (2019)