Author of the publication

Effective Defense Schemes for Phishing Attacks on Mobile Computing Platforms.

, , and . IEEE Trans. Vehicular Technology, 65 (8): 6678-6691 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

When Energy Trading meets Blockchain in Electrical Power System: The State of the Art., , , , , , and . CoRR, (2019)An Efficient Privacy-Preserving Algorithm Based on Randomized Response in IoT-Based Smart Grid., , , , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 881-886. IEEE, (2018)A Novel Traceroute-Based Detection Scheme for Wi-Fi Evil Twin Attacks., , , and . GLOBECOM, page 1-6. IEEE, (2017)Achieving data utility-privacy tradeoff in Internet of Medical Things: A machine learning approach., , , , and . Future Gener. Comput. Syst., (2019)Designing novel proxy-based access control scheme for implantable medical devices., and . Comput. Stand. Interfaces, (January 2024)EFFECT: an efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid., , , , and . Sci. China Inf. Sci., 62 (3): 32103:1-32103:14 (2019)A Practical Cross-Device Federated Learning Framework over 5G Networks., , , , , and . CoRR, (2022)GradDiff: Gradient-based membership inference attacks against federated distillation with differential comparison., , and . Inf. Sci., (February 2024)Access Control Schemes for Implantable Medical Devices: A Survey., , , and . IEEE Internet Things J., 4 (5): 1272-1283 (2017)Security threats to mobile multimedia applications: Camera-based attacks on mobile phones., , and . IEEE Communications Magazine, 52 (3): 80-87 (2014)