Author of the publication

Modeling and Verifying Privacy-Preserving Authentication Scheme for VANET Using CSP.

, , , and . COMPSAC, page 747-752. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ARUM: Polar-Coded HARQ Scheme Based on Incremental Channel Polarization., , , , , and . IEEE Communications Letters, 22 (12): 2519-2522 (2018)Service Differentiation in OFDM-Based IEEE 802.16 Networks., , , , , and . EURASIP J. Wireless Comm. and Networking, (2009)Enabling ECN over Generic Packet Scheduling., , , , and . CoNEXT, page 191-204. ACM, (2016)Collaborative filtering and deep learning based recommendation system for cold start items., , , , and . Expert Syst. Appl., (2017)Characterizing the Growth Patterns of 45 Major Metropolitans in Mainland China Using DMSP/OLS Data., , and . Remote Sensing, 9 (6): 571 (2017)Fused Text Segmentation Networks for Multi-oriented Scene Text Detection., , , and . CoRR, (2017)Planning with Task-Oriented Knowledge Acquisition for a Service Robot., , and . IJCAI, page 812-818. IJCAI/AAAI Press, (2016)Optimal Defense Strategies for DDoS Defender Using Bayesian Game Model., , , , and . ISPEC, volume 7863 of Lecture Notes in Computer Science, page 44-59. Springer, (2013)A novel scene text detection algorithm based on convolutional neural network., , , , , and . VCIP, page 1-4. IEEE, (2016)Optimal Path Planning for Minimizing Disturbance of Space Robot., , and . ICARCV, page 1-6. IEEE, (2006)