Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Post-Quantum Public-key Authenticated Searchable Encryption with Forward Security: General Construction, Implementation, and Applications., , , , and . IACR Cryptol. ePrint Arch., (2023)Lattice-based Public Key Encryption with Authorized Keyword Search: Construction, Implementation, and Applications., , , , and . IACR Cryptol. ePrint Arch., (2023)A Lattice-Based Ring Signature Scheme to Secure Automated Valet Parking., , , , , and . WASA (2), volume 12938 of Lecture Notes in Computer Science, page 70-83. Springer, (2021)Spatial-Temporal Interactive Graph Neural Network for Traffic Forecasting., , and . ICCCS, page 1174-1179. IEEE, (2023)APKI: An Anonymous Authentication Scheme Based on PKI for VANET., , , , , and . ICCCS, page 530-536. IEEE, (2022)Research on Ship Target Recognition based on Infrared Image Method., , , and . CNIOT, page 197-202. ACM, (2023)Indoor SLAM Algorithm Based on PL-ICP and Map Matching., , , , and . ICCIR, page 295-299. ACM, (2021)PP-ST: An Indoor Mobile Robot Path Tracking Algorithm., , , , and . IEEE Access, (2023)SBA-GT: A Secure Bandwidth Allocation Scheme with Game Theory for UAV-Assisted VANET Scenarios., , , , and . WASA (2), volume 13472 of Lecture Notes in Computer Science, page 356-364. Springer, (2022)FusionMapping: Learning Depth Prediction with Monocular Images and 2D Laser Scans., , , , and . CoRR, (2019)