Author of the publication

A game-theoretic approach of mixing different qualities of coins.

, , , , , and . Int. J. Intell. Syst., 35 (12): 1899-1911 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Epoch: Enabling Path Concealing Payment Channel Hubs with Optimal Path Encryption., , , , , , and . Inscrypt (1), volume 14526 of Lecture Notes in Computer Science, page 107-125. Springer, (2023)Adversarial behaviours in mixing coins under incomplete information., , , , and . Appl. Soft Comput., (2020)A Limited Proxy Re-encryption with Keyword Search for Data Access Control in Cloud Computing., , , , and . NSS, volume 8792 of Lecture Notes in Computer Science, page 82-95. Springer, (2014)Query Evaluation by Circuits., and . PODS, page 67-78. ACM, (2022)RETSR: An Effective Review-Enhanced and Time-Aware Sequential Recommendation Framework., , , and . ICTAI, page 826-831. IEEE, (2022)A systematic mapping study for blockchain based on complex network., , , , , , and . Concurr. Comput. Pract. Exp., (2022)Fairness with Semi-rational Players in Standard Communication Networks., and . INCoS, page 293-298. IEEE Computer Society, (2011)TSHML: Token Shuffling under Haircut Policy Based on Machine Learning., , , , and . iThings/GreenCom/CPSCom/SmartData/Cybermatics, page 401-405. IEEE, (2022)A Deep Learning Approach with Conditional Random Field for Automatic Sleep Stage Scoring., , , , , and . EITCE, page 901-906. ACM, (2021)Using information entropy to analyze secure multi-party computation protocol., , , , and . DASC/PiCom/CBDCom/CyberSciTech, page 312-318. IEEE, (2021)