Author of the publication

Trustworthiness Management Based on Blockchain in the Internet of Things.

, , , and . EBIMCS, page 18-23. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Double Layers Self-Organized Spiking Neural P Systems With Anti-Spikes for Fingerprint Recognition., , , , , and . IEEE Access, (2019)An Approach for Building an Integrated Environment for Molecular Biology Databases., , and . Distributed Parallel Databases, 1 (3): 303-327 (1993)A Specification-Based Intrusion Detection Model for OLSR., , , , and . RAID, volume 3858 of Lecture Notes in Computer Science, page 330-350. Springer, (2005)Formal Reasoning About Intrusion Detection Systems., , , , and . RAID, volume 3224 of Lecture Notes in Computer Science, page 278-295. Springer, (2004)Robotic-Assisted Rehabilitation Trainer Improves Balance Function in Stroke Survivors., , , , and . IEEE Trans. Cogn. Dev. Syst., 12 (1): 43-53 (2020)Discriminative Correlation Filter for Long-Time Tracking., , , , and . Comput. J., 63 (3): 460-468 (2020)Equilateral Triangular Dielectric Resonator and Metal Patch Hybrid Antenna for UWB Application., , , , , , and . IEEE Access, (2019)V-Lab® - A Distributed Intelligent Discrete-Event Environment for Autonomous Agents Simulationi., , , , , , , , , and 7 other author(s). Intell. Autom. Soft Comput., 9 (3): 181-214 (2003)A novel integrated MEG and EEG analysis method for dipolar sources., , , , , , , , , and 2 other author(s). NeuroImage, 37 (3): 731-748 (2007)Tropical Cyclone Size Estimation Using Deep Convolutional Neural Network., , , , , and . IGARSS, page 8472-8475. IEEE, (2021)