Author of the publication

一种基于区块链技术的多阶段级联无线安全认证方案 (Multi-stage Cascade Wireless Security Authentication Scheme Based on Blockchain Technology).

, , , , and . 计算机科学, 46 (12): 180-185 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Multimodel Fusion Engine for Filtering Webpages., , , and . IEEE Access, (2018)Automatic Construction of Multi-layer Perceptron Network from Streaming Examples., , , , and . CIKM, page 1171-1180. ACM, (2019)Recent Advances in Supervised Dimension Reduction: A Survey., , and . Mach. Learn. Knowl. Extr., 1 (1): 341-358 (2019)Multi-Scale Attention Generative Adversarial Network for Medical Image Enhancement., , , , and . IEEE Trans. Emerg. Top. Comput. Intell., 7 (4): 1113-1125 (August 2023)OSUMI: On-Shelf Utility Mining from Itemset-based Data., , , , , and . IEEE BigData, page 5340-5349. IEEE, (2020)Three-way decision-based conditional probabilities by opinion scores and Bayesian rules in circular-Pythagorean fuzzy sets for developing sustainable smart living framework., , , , , , and . Inf. Sci., (November 2023)Internet of Behaviors: A Survey., , , , and . IEEE Internet Things J., 10 (13): 11117-11134 (July 2023)Fuzzy and Real-Coded Chemical Reaction Optimization for Intrusion Detection in Industrial Big Data Environment., , , , and . IEEE Trans. Ind. Informatics, 17 (6): 4298-4307 (2021)Deep learning pipelines for recognition of gait biometrics with covariates: a comprehensive review., , , , and . Artif. Intell. Rev., 56 (8): 8889-8953 (2023)Group incremental adaptive clustering based on neural network and rough set theory for crime report categorization., , , , and . Neurocomputing, (2021)