Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IEEE Access Special Section: Security Analytics and Intelligence for Cyber Physical Systems., , , , and . IEEE Access, (2020)LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey., , and . IEEE Access, (2018)Security Threats and Countermeasures of Unmanned Aerial Vehicle Communications., , , and . IEEE Commun. Stand. Mag., 5 (4): 41-47 (2021)PerContRep: a practical reputation system for pervasive content services., , and . J. Supercomput., 70 (3): 1051-1074 (2014)Right-and-left visual field stimulation: A frequency and space mixed coding method for SSVEP based brain-computer interface., , and . Sci. China Inf. Sci., 54 (12): 2492-2498 (2011)Influence Spread in Geo-Social Networks: A Multiobjective Optimization Perspective., , , , , and . IEEE Trans. Cybern., 51 (5): 2663-2675 (2021)Nonvolatile Flexible Memory Based on a Planar Zigzag-Type Nitrogen-Doped Picene., , , , , , , , , and . Adv. Intell. Syst., 2 (12): 2000155 (2020)SVsearcher: A more accurate structural variation detection method in long read data., , and . Comput. Biol. Medicine, (May 2023)Analysis on the acceptance of Global Trust Management for unwanted traffic control based on game theory., , and . Comput. Secur., (2014)On 3-stable number conditions in n-connected claw-free graphs., and . Discret. Math., 341 (9): 2499-2507 (2018)