Author of the publication

A Blockchain-Based Traffic Conditions and Driving Behaviors Warning Scheme in the Internet of Vehicles.

, , , , and . ICCT, page 1160-1164. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Android Malware Detection Approach Based on Convolutional Neural Network., , and . ICCSP, page 144-149. ACM, (2018)Fine-grained P2P traffic classification by simply counting flows., , , and . Frontiers Inf. Technol. Electron. Eng., 16 (5): 391-403 (2015)Feedback based Sampling for Intrusion Detection in Software Defined Network., , , and . ICCSP, page 95-99. ACM, (2018)MADDC: Multi-Scale Anomaly Detection, Diagnosis and Correction for Discrete Event Logs., , , , , , , and . ACSAC, page 769-784. ACM, (2022)A Blockchain-Based Traffic Conditions and Driving Behaviors Warning Scheme in the Internet of Vehicles., , , , and . ICCT, page 1160-1164. IEEE, (2019)Defending against Adversarial Attacks in Federated Learning on Metric Learning Model., , , and . TrustCom, page 197-206. IEEE, (2023)Detecting Malicious Gradients from Asynchronous SGD on Variational Autoencoder., , and . SRDS, page 321-330. IEEE, (2021)Dual-branch combination network (DCN): Towards accurate diagnosis and lesion segmentation of COVID-19 using CT images., , , , , , , , , and 2 other author(s). Medical Image Anal., (2021)LeakDoctor: Toward Automatically Diagnosing Privacy Leaks in Mobile Applications., , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 3 (1): 28:1-28:25 (2019)PrivacyContext: identifying malicious mobile privacy leak using program context., and . Int. J. Inf. Comput. Secur., 11 (6): 562-584 (2019)