Author of the publication

An ADS-B Message Authentication Method Based on Certificateless Short Signature.

, , , and . IEEE Trans. Aerosp. Electron. Syst., 56 (3): 1742-1753 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distance Geometry Optimization for Protein Structures., and . J. Glob. Optim., 15 (3): 219-234 (1999)A Geometric Build-Up Algorithm for Solving the Molecular Distance Geometry Problem with Sparse Distance Data., and . J. Glob. Optim., 26 (3): 321-333 (2003)MFPD-LSTM: A steganalysis method based on multiple features of pitch delay using RNN-LSTM., and . J. Inf. Secur. Appl., (May 2023)Flow-oriented detection of low-rate denial of service attacks., , and . Int. J. Commun. Syst., 29 (1): 130-141 (2016)An Optimized Power-Efficiency Coordinated Control Method for EVs Charging and Discharging Applications., , , , and . IEEE Trans. Ind. Electron., 70 (7): 7257-7267 (July 2023)The Effective Energy Transformation Scheme as a Special Continuation Approach to Global Optimization with Application to Molecular Conformation.. SIAM J. Optimization, 6 (3): 748-768 (1996)BD-II NMA&SSI: An Scheme of Anti-Spoofing and Open BeiDou II D2 Navigation Message Authentication., , and . IEEE Access, (2020)ECDSA-Based Message Authentication Scheme for BeiDou-II Navigation Satellite System., , and . IEEE Trans. Aerosp. Electron. Syst., 55 (4): 1666-1682 (2019)A deep transfer-learning-based dynamic reinforcement learning for intelligent tightening system., , , , and . Int. J. Intell. Syst., 36 (3): 1345-1365 (2021)Low-Rate DDoS Attack Detection Based on Factorization Machine in Software Defined Network., , , , and . IEEE Access, (2020)