From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Adversarial Attacks for Intrusion Detection Based on Bus Traffic., , , , , и . IEEE Netw., 36 (4): 203-209 (2022)Toward Hybrid Static-Dynamic Detection of Vulnerabilities in IoT Firmware., , , , , , и . IEEE Netw., 35 (2): 202-207 (2021)Software-Defined-Networking-Enabled Traffic Anomaly Detection and Mitigation., , , и . IEEE Internet Things J., 4 (6): 1890-1898 (2017)Security and privacy in emerging networks: Part 1 Guest Editorial., , , , , и . IEEE Commun. Mag., 53 (4): 18-19 (2015)Toward Detecting Collusive Ranking Manipulation Attackers in Mobile App Markets., , , и . AsiaCCS, стр. 58-70. ACM, (2017)Security-Enhanced Reprogramming with XORs Coding in Wireless Sensor Networks., , и . ICICS, том 9543 из Lecture Notes in Computer Science, стр. 421-435. Springer, (2015)You Can Glimpse but You Cannot Identify: Protect IoT Devices From Being Fingerprinted., , , , и . IEEE Trans. Dependable Secur. Comput., 21 (3): 1210-1223 (мая 2024)A Lightweight Certificateless Non-interactive Authentication and Key Exchange Protocol for IoT Environments., , , , , и . ISCC, стр. 1-7. IEEE, (2021)Traffic Sign Recognition Based on Semantic Scene Understanding and Structural Traffic Sign Location., , , , , и . IEEE Trans. Intell. Transp. Syst., 23 (9): 15794-15807 (2022)Analyses of several recently proposed group key management schemes., , , и . Secur. Commun. Networks, 8 (2): 136-148 (2015)