Author of the publication

A Practical Heartbeat-based Defense Scheme Against Cloning Attacks in PoA Blockchain.

, , , , , , and . Comput. Stand. Interfaces, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Study of the Impact of Individual Differences on Online Shopping., , and . IJEBR, 6 (1): 52-67 (2010)A Model of System Re-Configurability and Pedagogical Usability in an E-Learning Context: A Faculty Perspective., , and . JOEUC, 22 (3): 66-81 (2010)An efficiency-enhanced wireless power transfer system with segmented transmitting coils for endoscopic capsule., , , , , , and . ISCAS, page 2279-2282. IEEE, (2013)Gridless sparse recovery methods for DLSLA 3-D SAR crosstrack reconstruction., , , , , , and . IGARSS, page 3234-3237. IEEE, (2016)An efficient traceable data sharing scheme in cloud computing for mobile devices., , and . IJHPCN, 12 (2): 156-165 (2018)The chromatic equivalence class of graph ‾Bn-6, 12., , , and . Discussiones Mathematicae Graph Theory, 28 (2): 189-218 (2008)An Associated Deletion Scheme for Multi-copy in Cloud Storage., , , , and . ICA3PP (4), volume 11337 of Lecture Notes in Computer Science, page 511-526. Springer, (2018)An Effective Cloud-Based Active Defense System against Malicious Codes., , , and . ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 690-695. Springer, (2014)Receiver design for OFDM-CDMA systems with multiplexed STBC., , and . PIMRC, page 2420-2424. IEEE, (2005)GIT: A Generative Image-to-text Transformer for Vision and Language., , , , , , , , and . Trans. Mach. Learn. Res., (2022)