Author of the publication

Security Threats from Bitcoin Wallet Smartphone Applications: Vulnerabilities, Attacks, and Countermeasures.

, , , , , , and . CODASPY, page 89-100. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

考虑时间因素的0-1背包调度问题 (0-1 Knapsack Variant with Time Scheduling)., , , and . 计算机科学, 45 (4): 53-59 (2018)MepmiRDB: a medicinal plant microRNA database., , , , , , , , , and . Database J. Biol. Databases Curation, (2019)Domain Representation for Knowledge Graph Embedding., , , , , and . NLPCC (1), volume 11838 of Lecture Notes in Computer Science, page 197-210. Springer, (2019)How to Attract More Viewers in Live Streams? A Functional Evaluation of Streamers' Strategies for Attraction of Viewers., , , and . HCI (24), volume 12204 of Lecture Notes in Computer Science, page 369-383. Springer, (2020)A Multi-Channel MAC Protocol With Retrodirective Array Antennas in Flying Ad Hoc Networks., , , and . IEEE Trans. Veh. Technol., 70 (2): 1606-1617 (2021)On the Power Leakage Problem in Beamspace MIMO Systems with Lens Antenna Array., , , , and . VTC Fall, page 1-5. IEEE, (2017)Insecurity of operational cellular IoT service: new vulnerabilities, attacks, and countermeasures., , , , , , , , , and . MobiCom, page 437-450. ACM, (2021)Research on Data driven Communication Network Situation Awareness System., , , and . AIIPCC, page 239-242. IEEE, (2022)An 84dB-SNDR Low-OSR 4th-Order Noise-Shaping SAR with an FIA-Assisted EF-CRFF Structure and Noise-Mitigated Push-Pull Buffer-in-Loop Technique., , , and . ISSCC, page 418-420. IEEE, (2022)An Inter-blockchain Escrow Approach for Fast Bitcoin Payment., , , and . ICDCS, page 1201-1202. IEEE, (2020)