From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

TrustAccess: A Trustworthy Secure Ciphertext-Policy and Attribute Hiding Access Control Scheme Based on Blockchain., , , , и . IEEE Trans. Veh. Technol., 69 (6): 5784-5798 (2020)Demons in the Shared Kernel: Abstract Resource Attacks Against OS-level Virtualization., , , , , , , , , и 1 other автор(ы). CCS, стр. 764-778. ACM, (2021)Attacks are Forwarded: Breaking the Isolation of MicroVM-based Containers Through Operation Forwarding., , , , , , , и . USENIX Security Symposium, стр. 7517-7534. USENIX Association, (2023)MT-CNN: A Classification Method of Encrypted Traffic Based on Semi-Supervised Learning., , , , и . GLOBECOM, стр. 7538-7543. IEEE, (2023)Protecting Your Offloading Preference: Privacy-aware Online Computation Offloading in Mobile Blockchain., , , и . IWQoS, стр. 1-10. IEEE, (2021)SEMMI: Multi-party Security Decision-making Scheme Under the Internet of Medical Things., , , , и . ICC, стр. 2792-2797. IEEE, (2022)Social Networks Based Robust Federated Learning for Encrypted Traffic Classification., , , , , , и . ICC, стр. 4937-4942. IEEE, (2023)Privacy-preserving Diverse Keyword Search and Online Pre-diagnosis in Cloud Computing., , , , и . SERVICES, стр. 19. IEEE, (2021)SRDPV: secure route discovery and privacy-preserving verification in MANETs., , и . Wireless Networks, 25 (4): 1731-1747 (2019)Measurement on the border effect of transboundary water resources: A case study of China's Zhanghe basin., , , и . SMC, стр. 1928-1934. IEEE, (2014)