Author of the publication

Security Vulnerabilities and Countermeasures for Time Synchronization in TSCH Networks.

, , , and . Wirel. Commun. Mob. Comput., (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research Review on Parking Space Detection Method., , , , , and . Symmetry, 13 (1): 128 (2021)Qos-driven SCTP-based multimedia delivery over heterogeneous wireless networks., , , and . Sci. China Inf. Sci., 57 (10): 1-10 (2014)EDSF: Efficient Distributed Scheduling Function for IETF 6TiSCH-based Industrial Wireless Networks., , , , and . Mob. Networks Appl., 27 (6): 2244-2253 (December 2022)CP-TPS: A Real-Time Transaction Processing Strategy Supporting Compensatory Task., , , and . CSE/EUC (1), page 475-482. IEEE Computer Society, (2017)Data Flow-driven and Attention Mechanism-enabled Smart Contract Vulnerability Detection for Secure and Green Blockchain-based Service Networks., , , , , and . ICC, page 5135-5140. IEEE, (2023)Blockchain-Based Cross-Border Supply Chain Model., , , , , , and . MONAMI, volume 474 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 48-62. Springer, (2022)A Decentralized Scheduling Function for TSCH-Based Wireless Networks., , , , , and . MONAMI, volume 418 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 194-200. Springer, (2021)FCSO: Source Code Summarization by Fusing Multiple Code Features and Ensuring Self-consistency Output., , , , , , and . ICA3PP (2), volume 14488 of Lecture Notes in Computer Science, page 112-129. Springer, (2023)USDSE: A Novel Method to Improve Service Reputation Based on Double-Side Evaluation., , , , , and . ML4CS (3), volume 13657 of Lecture Notes in Computer Science, page 484-498. Springer, (2022)A Security Architecture for Internet of Things Based on Blockchain., , , , , and . BlockSys, volume 1156 of Communications in Computer and Information Science, page 363-368. Springer, (2019)