Author of the publication

Security Threats from Bitcoin Wallet Smartphone Applications: Vulnerabilities, Attacks, and Countermeasures.

, , , , , , and . CODASPY, page 89-100. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Dilated CNN Model for Image Classification., , and . IEEE Access, (2019)PTA-SC: Privacy-Preserving Task Allocation for Spatial Crowdsourcing., , and . WCNC, page 1-7. IEEE, (2021)SecEQP: A Secure and Efficient Scheme for SkNN Query Problem Over Encrypted Geodata on Cloud., , , and . ICDE, page 662-673. IEEE, (2019)Towards Inference of Original Graph Data Information from Graph Embeddings., , , , and . IJCNN, page 1-10. IEEE, (2023)Securely and efficiently perform large matrix rank decomposition computation via cloud computing., , , and . Clust. Comput., 18 (2): 989-997 (2015)SecEDMO: Enabling Efficient Data Mining with Strong Privacy Protection in Cloud Computing., , , , , and . IEEE Trans. Cloud Comput., 10 (1): 691-705 (2022)Second-Order Consensus Seeking in Multi-Agent Systems With Nonlinear Dynamics Over Random Switching Directed Networks., , , , and . IEEE Trans. Circuits Syst. I Regul. Pap., 60-I (6): 1595-1607 (2013)Cross-Layer Patch Alignment and Intra-and-Inter Patch Relations for Knowledge Distillation., , , , and . ICIP, page 535-539. IEEE, (2023)Two Types of Novel DoS Attacks Against CDNs Based on HTTP/2 Flow Control Mechanism., , , , and . ESORICS (1), volume 13554 of Lecture Notes in Computer Science, page 467-487. Springer, (2022)Group Key Agreement Protocol for MANETs Based on HSK Scheme., , and . CoRR, (2013)