Author of the publication

Secure and Usable Handshake Based Pairing for Wrist-Worn Smart Devices on Different Users.

, , , , , and . Mob. Networks Appl., 26 (6): 2407-2422 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ARMOR: A trust-based privacy-preserving framework for decentralized friend recommendation in online social networks., , , , and . Future Gener. Comput. Syst., (2018)Privacy-Preserving Distributed Multi-Task Learning against Inference Attack in Cloud Computing., , , , , and . ACM Trans. Internet Techn., 22 (2): 45:1-45:24 (2022)Android Malware Detection Based on Call Graph via Graph Neural Network., , , , , and . NaNA, page 368-374. IEEE, (2020)Lightweight Security Authentication Mechanism Towards UAV Networks., , , , , , , and . NaNA, page 379-384. IEEE, (2019)Siamese pyramid residual module with local binary convolution network for single object tracking., , , , , and . Int. J. Wavelets Multiresolution Inf. Process., 19 (6): 2150026:1-2150026:17 (2021)Channel Hourglass Residual Network For Single Image Super-Resolution., , , and . IJCNN, page 1-8. IEEE, (2021)Self-Anomaly-Detection Model Training via Initialized Meta Model., , , , , , and . NaNA, page 471-476. IEEE, (2022)A secured TPM integration scheme towards smart embedded system based collaboration network., , , , , , , and . Comput. Secur., (2020)Android Malware Detection via Graph Representation Learning., , , , , and . Mob. Inf. Syst., (2021)Indian Buffet Process-Based on Nonnegative Matrix Factorization with Single Binary Component., , , , and . SMC, page 1139-1144. IEEE, (2021)