Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tolerable Data Transmission of Mobile Edge Computing Under Internet of Things., , and . IEEE Access, (2019)Survey on key security technologies for space information networks., , , , and . J. Comm. Inform. Networks, 1 (1): 72-85 (2016)Secure pay-TV for chained hotels., , , , and . Int. J. Inf. Sec., 17 (1): 33-42 (2018)Lightweight and Privacy-Preserving Charging Reservation Authentication Protocol for 5G-V2G., , , , and . IEEE Trans. Veh. Technol., 72 (6): 7871-7883 (June 2023)Orbital Debris Threat for Space Sustainability and Way Forward (Review Article)., , , and . IEEE Access, (2020)Secure User Verification and Continuous Authentication via Earphone IMU., , , , and . IEEE Trans. Mob. Comput., 22 (11): 6755-6769 (November 2023)Privacy-Preserving Cross-Silo Federated Learning Atop Blockchain for IoT., , , , , and . IEEE Internet Things J., 10 (24): 21176-21186 (December 2023)Cascade Learning Embedded Vision Inspection of Rail Fastener by Using a Fault Detection IoT Vehicle., , , , , and . IEEE Internet Things J., 10 (4): 3006-3017 (February 2023)Feature Extraction Method of Helicopter Target Based on Flicker Phenomenon Combined With Phase Compensation., , , , , , and . IEEE Access, (2022)Privacy Preservation for Outsourced Medical Data With Flexible Access Control., , , and . IEEE Access, (2018)