From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

LRCoin: Leakage-Resilient Cryptocurrency Based on Bitcoin for Data Trading in IoT., , , , , , и . IEEE Internet of Things Journal, 6 (3): 4702-4710 (2019)Channel Measurement and Resource Allocation Scheme for Dual-Band Airborne Access Networks., , , , , и . IEEE Access, (2019)FineRoute: Personalized and Time-Aware Route Recommendation Based on Check-Ins., , , и . IEEE Trans. Vehicular Technology, 66 (11): 10461-10469 (2017)Security in wireless sensor networks., и . IEEE Wirel. Commun., 15 (4): 60-66 (2008)Mobile cloud computing in 5G: Emerging trends, issues, and challenges Guest Editorial., , , и . IEEE Netw., 29 (2): 4-5 (2015)Identifying Control and Management Plane Poison Message Failure by K-Nearest Neighbor Method.. J. Netw. Syst. Manag., 14 (2): 243-259 (2006)Real-Time Behavior Analysis and Identification for Android Application., , , , , и . IEEE Access, (2018)Monitoring User-Intent of Cloud-Based Networked Applications in Cognitive Networks., , , , и . GLOBECOM, стр. 1-7. IEEE, (2018)Haddle: A Framework for Investigating Data Leakage Attacks in Hadoop., , , , и . GLOBECOM, стр. 1-6. IEEE, (2015)A Heuristic Statistical Testing Based Approach for Encrypted Network Traffic Identification., , , , , и . IEEE Trans. Veh. Technol., 68 (4): 3843-3853 (2019)