Author of the publication

A secure data deletion scheme for IoT devices through key derivation encryption and data analysis.

, , , , , , and . Future Gener. Comput. Syst., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Block rank sparsity-aware DOA estimation with large-scale arrays in the presence of unknown mutual coupling., , , , and . Digit. Signal Process., (2019)Tensor-Based Angle Estimation Approach for Strictly Noncircular Sources with Unknown Mutual Coupling in Bistatic MIMO Radar., , , , , , and . Sensors, 18 (9): 2788 (2018)DCDC-LSB: Double Cover Dark Channel Least Significant Bit Steganography., , and . ICAIS (2), volume 12737 of Lecture Notes in Computer Science, page 360-375. Springer, (2021)Hierarchical Attention Network for Interpretable and Fine-Grained Vulnerability Detection., , , , , , , and . INFOCOM Workshops, page 1-6. IEEE, (2022)Deep Learning and Data Randomness based Blind Recognition of Channel Codes., , , , and . SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta, page 1441-1448. IEEE, (2022)Searchable Encryption Scheme Based on CPABE with Attribute Update in a Cloud Medical Environment., , and . ICCCS (3), volume 11065 of Lecture Notes in Computer Science, page 265-276. Springer, (2018)Robust DOA Estimation for MIMO Radar in Unknown Nonuniform Noise and Mutual Coupling., , , , , and . SAM, page 194-197. IEEE, (2018)Wireless Mesh Networks-Based Multinetwork Convergence and Security Access., and . Guide to Wireless Mesh Networks, Springer, (2009)Feature graph construction with static features for malware detection., , , , and . CoRR, (2024)Vulnerability Analysis of Interdependent Scale-Free Networks with Complex Coupling., , , , and . J. Electr. Comput. Eng., (2017)