Author of the publication

Anti-Clone: A Lightweight Approach for RFID Cloning Attacks Detection.

, , , , , and . CollaborateCom (2), volume 461 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 75-90. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comprehensive Performance Analysis of Two-Way Multi-Relay System with Amplify-and-Forward Relaying., , , , and . IEICE Trans. Commun., 97-B (3): 666-673 (2014)Optimal workflows of AllJoyn network with centralized management gateway., , and . CCIS, page 303-307. IEEE, (2016)BPCluster: An Anomaly Detection Algorithm for RFID Trajectory Based on Probability., , , , , and . ISCC, page 844-850. IEEE, (2023)DTCluster: A CFSFDP Improved Algorithm for RFID Trajectory Clustering Under Digital-twin Driven., , , , and . APNOMS, page 1-6. IEEE, (2019)TransRF: Towards a Generalized and Cross-Domain RFID Sensing System Using Few-Shot Learning., , and . CSCWD, page 571-576. IEEE, (2023)Multiple Protocols Interworking With Open Connectivity Foundation in Fog Networks., , and . IEEE Access, (2019)An Improved Adaptive Digital Beamforming for Anti-Interference Communications., and . APCC, page 444-449. IEEE, (2018)Capacity of Two-Way In-Band Full-Duplex Relaying with Imperfect Channel State Information., , , , and . IEICE Trans. Commun., 101-B (4): 1108-1115 (2018)The Improved Algorithm Based on DFS and BFS for Indoor Trajectory Reconstruction., , , , and . WASA, volume 9798 of Lecture Notes in Computer Science, page 464-474. Springer, (2016)A Simple RFID-Based Architecture for Privacy Preservation., , , and . TrustCom/BigDataSE/ISPA (1), page 1224-1229. IEEE, (2015)