Author of the publication

Advancements in Industrial Cyber-Physical Systems: An Overview and Perspectives.

, , , , , and . IEEE Trans. Ind. Informatics, 19 (1): 716-729 (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Security of a White-Box Implementation of SHARK., and . ISC, volume 9290 of Lecture Notes in Computer Science, page 455-471. Springer, (2015)Soil Organic Carbon Prediction Using Vis-NIR Spectroscopy with a Large Dataset., , and . CCTA (1), volume 545 of IFIP Advances in Information and Communication Technology, page 76-86. Springer, (2017)Obfuscatable Anonymous Authentication Scheme for Mobile Crowd Sensing., , , , and . IEEE Syst. J., 13 (3): 2918-2929 (2019)Asynchronous Self-Triggered Stochastic Distributed MPC for Cooperative Vehicle Platooning Over Vehicular Ad-Hoc Networks., , , and . IEEE Trans. Veh. Technol., 72 (11): 14061-14073 (November 2023)A blockchain-based authority management framework in traceability systems., , , , , and . Int. J. Comput. Sci. Eng., 24 (1): 42-54 (2021)What we achieve on text extractive summarization based on graph?, , , and . J. Intell. Fuzzy Syst., 43 (6): 7057-7065 (2022)Secure Mobile Agents in Electronic Commerce by Using Undetachable Signatures from Pairings., , , and . ICEB, page 1038-1043. Academic Publishers/World Publishing Corporation, (2004)Robustness Analysis of Asynchronous Sampled-Data Multiagent Networks With Time-Varying Delays., , and . IEEE Trans. Automat. Contr., 63 (7): 2145-2152 (2018)EAP Extensions for the EAP Re-authentication Protocol (ERP)., , , , and . RFC, (July 2012)An ultra-lightweight white-box encryption scheme for securing resource-constrained IoT devices., , , and . ACSAC, page 16-29. ACM, (2016)