Author of the publication

An Efficient Traceable and Anonymous Authentication Scheme for Permissioned Blockchain.

, , , and . ICWS, volume 11512 of Lecture Notes in Computer Science, page 110-125. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Generalized Doubly Robust Learning Framework for Debiasing Post-Click Conversion Rate Prediction., , , , , , , and . KDD, page 252-262. ACM, (2022)Analysis of Human Factor in Air Traffic Control Unsafe Events Based on Improved DECIDE Model., , , and . HCI (5), volume 12185 of Lecture Notes in Computer Science, page 365-374. Springer, (2020)Wireless Information Surveillance via Proactive Eavesdropping with Spoofing Relay., and . J. Sel. Topics Signal Processing, 10 (8): 1449-1461 (2016)Adaptive pattern selection strategy for diamond search algorithm in fast motion estimation., , , and . Multimedia Tools Appl., 78 (2): 2447-2464 (2019)Exploiting NOMA for Multi-Beam UAV Communication in Cellular Uplink., , and . CoRR, (2018)Improper Signaling for Symbol Error Rate Minimization in K-User Interference Channel., , and . CoRR, (2014)Design and implementation of gateway and server in an indoor high-precision positioning system., , , and . GCCE, page 540-541. IEEE, (2014)Energy Minimization for Wireless Communication with Rotary-Wing UAV., , and . CoRR, (2018)A Study on Phenotyping and Visualizing Black Box Warnings of Antineoplastic Breast Cancer Medications., , , , , and . CRI, AMIA, (2017)UAV-enabled multiuser wireless power transfer: Trajectory design and energy optimization., , and . APCC, page 1-6. IEEE, (2017)