Author of the publication

A security protocol with minimum interference for UWB and WiFi networks.

, , and . SCVT, page 1-5. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A security protocol with minimum interference for UWB and WiFi networks., , and . SCVT, page 1-5. IEEE, (2013)A Security Technology for Mobile Agent System Improved by Trusted Computing Platform., and . HIS (3), page 46-50. IEEE Computer Society, (2009)A Data-Free Substitute Model Training Method for Textual Adversarial Attacks., and . ICONIP (14), volume 1968 of Communications in Computer and Information Science, page 295-307. Springer, (2023)Meta-IDS: Meta-Learning-Based Smart Intrusion Detection System for Internet of Medical Things (IoMT) Network., , , , and . IEEE Internet Things J., 11 (13): 23080-23095 (July 2024)IFL-GAN: Improved Federated Learning Generative Adversarial Network With Maximum Mean Discrepancy Model Aggregation., , , , , and . IEEE Trans. Neural Networks Learn. Syst., 34 (12): 10502-10515 (December 2023)A Survey of Automatic Software Vulnerability Detection, Program Repair, and Defect Prediction Techniques., and . Secur. Commun. Networks, (2020)Food Item Recognition and Intake Measurement Techniques., , , and . ICMLC, page 405-411. ACM, (2019)Research of Mobile Agent Technology for GIS Grid., and . HIS (2), page 190-194. IEEE Computer Society, (2009)A cloud based dual-root trust model for secure mobile online transactions., , , and . WCNC, page 4404-4409. IEEE, (2013)