Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Social Networks Based Robust Federated Learning for Encrypted Traffic Classification., , , , , , and . ICC, page 4937-4942. IEEE, (2023)SEMMI: Multi-party Security Decision-making Scheme Under the Internet of Medical Things., , , , and . ICC, page 2792-2797. IEEE, (2022)Efficient Data Retrieval Over Encrypted Attribute-Value Type Databases in Cloud-Assisted Ehealth Systems., , , , , , and . IEEE Syst. J., 16 (2): 3096-3107 (2022)CoAvoid: Secure, Privacy-Preserved Tracing of Contacts for Infectious Diseases., , , , , , and . IEEE J. Sel. Areas Commun., 40 (11): 3191-3206 (2022)APPLET: a privacy-preserving framework for location-aware recommender system., , , , , , and . Sci. China Inf. Sci., 60 (9): 92101 (2017)Credit-based scheme for security-aware and fairness-aware resource allocation in cloud computing., , , , and . Sci. China Inf. Sci., 60 (5): 52103:1-52103:17 (2017)Social Characteristic-Based Propagation-Efficient PBFT Protocol to Broadcast in Unstructured Overlay Networks., , , , and . IEEE Trans. Dependable Secur. Comput., 19 (6): 3621-3639 (2022)Antitampering Scheme of Evidence Transfer Information in Judicial System Based on Blockchain., , , , , , and . Secur. Commun. Networks, (2022)SADUS: Secure data deletion in user space for mobile devices., , , and . Comput. Secur., (2018)Selfholding: A combined attack model using selfish mining with block withholding attack., , , , , and . Comput. Secur., (2019)