Author of the publication

Secure Operations of Connected and Autonomous Vehicles.

, , , , , and . IEEE Trans. Intell. Veh., 8 (11): 4484-4497 (November 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Operations of Connected and Autonomous Vehicles., , , , , and . IEEE Trans. Intell. Veh., 8 (11): 4484-4497 (November 2023)Design and Implementation of Secure Hash Function Based on Parallel Structure., , , and . ICBAR, page 225-230. ACM, (2023)ParaDefender: A Scenario-Driven Parallel System for Defending Metaverses., , , , , , , , and . IEEE Trans. Syst. Man Cybern. Syst., 53 (4): 2118-2127 (April 2023)PatrolGo: Efficient Security Patrol Route Planning to Catch Intruders., , , and . DTPI, page 1-4. IEEE, (2023)Hierarchical Clustering of Group Behaviors in Cyber Situation Awareness., , , and . QRS Companion, page 400-401. IEEE, (2016)Continual Domain Adaption for Neural Machine Translation., , , and . ICONIP (11), volume 1965 of Communications in Computer and Information Science, page 427-439. Springer, (2023)