Author of the publication

A Blockchain-Based Cross-Domain and Autonomous Access Control Scheme for Internet of Things.

, , , , and . IEEE Trans. Serv. Comput., 16 (2): 773-786 (March 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Time-optimal and privacy preserving route planning for carpool policy., , , and . World Wide Web, 25 (3): 1151-1168 (2022)A Differentially Private Game Theoretic Approach for Deceiving Cyber Adversaries., , , and . IEEE Trans. Inf. Forensics Secur., (2021)Differential Advising in Multiagent Reinforcement Learning., , , , and . IEEE Trans. Cybern., 52 (6): 5508-5521 (2022)Learning Games for Defending Advanced Persistent Threats in Cyber Systems., , , , and . IEEE Trans. Syst. Man Cybern. Syst., 53 (4): 2410-2422 (April 2023)Differential Advising in Multi-Agent Reinforcement Learning., , , , and . CoRR, (2020)Privacy and Utility Trade-Off for Textual Analysis via Calibrated Multivariate Perturbations., , , , and . NSS, volume 12570 of Lecture Notes in Computer Science, page 342-353. Springer, (2020)A Blockchain-based Fast Authentication and Collaborative Video Data Forwarding Scheme for Vehicular Networks., , , , and . EUC, page 56-63. IEEE, (2021)Proactive Deepfake Defence via Identity Watermarking., , , , , and . WACV, page 4591-4600. IEEE, (2023)Deferentially Private Tagging Recommendation Based on Topic Model., , , , and . PAKDD (1), volume 8443 of Lecture Notes in Computer Science, page 557-568. Springer, (2014)CloudController: A Writable and Heterogeneous-Adaptive Virtual Machine Introspection for Cloud Management., , , , and . TrustCom/BigDataSE/ICESS, page 177-184. IEEE Computer Society, (2017)