Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography., and . Comput. Commun., 31 (10): 2142-2149 (2008)The Analysis of Peer-to-Peer Network Security., and . GCA, page 131-150. CSREA Press, (2005)Attack-Defense Quantification Based On Game-Theory., , and . CoRR, (2019)Robust Video Object Segmentation via Propagating Seams and Matching Superpixels., , , , and . IEEE Access, (2020)Semi-supervised Video Object Segmentation Via an Edge Attention Gated Graph Convolutional Network., , , , and . ACM Trans. Multim. Comput. Commun. Appl., 20 (1): 24:1-24:23 (January 2024)ERF-RTMDet: An Improved Small Object Detection Method in Remote Sensing Images., , , , , , and . Remote. Sens., 15 (23): 5575 (December 2023)DBSDS: A dual-blockchain security data sharing model with supervision and privacy-protection., , , , , and . Concurr. Comput. Pract. Exp., (2023)The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved., , , , and . IEEE Internet Things J., 6 (2): 1606-1616 (2019)Securing Traffic-Related Messages Exchange Against Inside-and-Outside Collusive Attack in Vehicular Networks., , , , and . IEEE Internet Things J., 6 (6): 9979-9992 (2019)Privacy-Preserving Federated Learning in Fog Computing., , , , , and . IEEE Internet Things J., 7 (11): 10782-10793 (2020)