Author of the publication

E^2 C-Chain: A Two-Stage Incentive Education Employment and Skill Certification Blockchain.

, , , and . Blockchain, page 140-147. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Visual hand gesture recognition with convolution neural network., , , and . SNPD, page 287-291. IEEE Computer Society, (2016)A fingertips detection method based on the combination of centroid and Harris corner algorithm., , , and . SNPD, page 225-230. IEEE Computer Society, (2016)Parameter and Tolerance Economic Design for Multivariate Quality Characteristics Based on the Modified Process Capability Index With Individual Observations., , , , and . IEEE Access, (2019)Data Aggregation Scheduling in Probabilistic Wireless Networks with Cognitive Radio Capability., , , , and . GLOBECOM, page 1-6. IEEE, (2016)PerCBA: Persistent Clean-label Backdoor Attacks on Semi-Supervised Graph Node Classification., , , , and . AISafety/SafeRL@IJCAI, volume 3505 of CEUR Workshop Proceedings, CEUR-WS.org, (2023)"My Replika Cheated on Me and She Liked It": A Taxonomy of Algorithmic Harms in Human-AI Relationships., , , , , and . CoRR, (2024)DMSPS: Dynamically mixed soft pseudo-label supervision for scribble-supervised medical image segmentation., , , , , , , and . Medical Image Anal., (2024)Tensor-Based Joint Symbol Detection, User Localization and Tracking for THz Systems With Dual-Wideband Effects., , , , , and . IEEE Trans. Veh. Technol., 73 (11): 17794-17799 (November 2024)GenTel-Safe: A Unified Benchmark and Shielding Framework for Defending Against Prompt Injection Attacks., , , , , and . CoRR, (2024)E-SAGE: Explainability-Based Defense Against Backdoor Attacks on Graph Neural Networks., , , , , and . WASA (1), volume 14997 of Lecture Notes in Computer Science, page 402-414. Springer, (2024)