Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Privacy-Preserving Friend Recommendation Scheme for Social Network., , , , and . IEEE Access, (2018)One Cycle Attack: Fool Sensor-Based Personal Gait Authentication With Clustering., , , , , and . IEEE Trans. Inf. Forensics Secur., (2021)TCFP: A Novel Privacy-Aware Edge Vehicular Trajectory Compression Scheme Using Fuzzy Markovian Prediction., , , , , and . SMC, page 1217-1223. IEEE, (2023)EspialCog: General, Efficient and Robust Mobile User Implicit Authentication in Noisy Environment., , , , , , , and . IEEE Trans. Mob. Comput., 21 (2): 555-572 (2022)General, Efficient, and Real-Time Data Compaction Strategy for APT Forensic Analysis., , , , , , , , and . IEEE Trans. Inf. Forensics Secur., (2021)A Novel Identity-Based Key Issuing Scheme Based on Interacting Neural Network., , and . ISNN (2), volume 3497 of Lecture Notes in Computer Science, page 637-642. Springer, (2005)WebSmell: An Efficient Malicious HTTP Traffic Detection Framework Using Data Augmentation., , , , , , and . Inscrypt, volume 12612 of Lecture Notes in Computer Science, page 193-201. Springer, (2020)TinyStream: A Lightweight and Novel Stream Cipher Scheme for Wireless Sensor Networks., , , and . CIS, page 528-532. IEEE Computer Society, (2010)DroidVecDeep: Android Malware Detection Based on Word2Vec and Deep Belief Network., , , , and . KSII Trans. Internet Inf. Syst., 13 (4): 2180-2197 (2019)Mining cell-id trajectory patterns by exploiting handoff features., , , and . UbiComp Adjunct, page 153-156. ACM, (2016)