Author of the publication

Graph-Based Covert Transaction Detection and Protection in Blockchain.

, , , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Assessing Systemic Risk to Cloud-Computing Technology as Complex Interconnected Systems of Systems., , , , and . Systems Engineering, 18 (3): 284-299 (2015)Self-coloring-Driven Plume Source Localization Strategy for Multiple Robots Using Dirichlet Process Gaussian Mixture Model and Mutation Random Salp Swarm Algorithm., , , , and . Neural Process. Lett., 55 (8): 10331-10351 (December 2023)Computing lower bounds for minimum sum coloring and optimum cost chromatic partition., , , and . Comput. Oper. Res., (2019)AesopAgent: Agent-driven Evolutionary System on Story-to-Video Production., , , , , , , , , and 2 other author(s). CoRR, (2024)Towards Scalable Distributed Training of Deep Learning on Public Cloud Clusters., , , , , , , , , and 14 other author(s). CoRR, (2020)Multi-modal Graph Learning for Disease Prediction., , , , , and . CoRR, (2021)Video-based human heart rate measurement using joint blind source separation., , , , and . Biomed. Signal Process. Control., (2017)Exploring Systemic Risks in Systems-of-Systems Within a Multiobjective Decision Framework., and . IEEE Trans. Syst. Man Cybern. Syst., 47 (6): 906-915 (2017)Cross-domain object recognition by output kernel learning., and . MMSP, page 372-377. IEEE, (2012)Scaling static taint analysis to industrial SOA applications: a case study at Alibaba., , , , , and . ESEC/SIGSOFT FSE, page 1477-1486. ACM, (2020)