Author of the publication

Android-based Cryptocurrency Wallets: Attacks and Countermeasures.

, , , , , and . Blockchain, page 9-16. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adversarial Attacks for Intrusion Detection Based on Bus Traffic., , , , , and . IEEE Netw., 36 (4): 203-209 (2022)Toward Hybrid Static-Dynamic Detection of Vulnerabilities in IoT Firmware., , , , , , and . IEEE Netw., 35 (2): 202-207 (2021)Software-Defined-Networking-Enabled Traffic Anomaly Detection and Mitigation., , , and . IEEE Internet Things J., 4 (6): 1890-1898 (2017)Security and privacy in emerging networks: Part 1 Guest Editorial., , , , , and . IEEE Commun. Mag., 53 (4): 18-19 (2015)Toward Detecting Collusive Ranking Manipulation Attackers in Mobile App Markets., , , and . AsiaCCS, page 58-70. ACM, (2017)Security-Enhanced Reprogramming with XORs Coding in Wireless Sensor Networks., , and . ICICS, volume 9543 of Lecture Notes in Computer Science, page 421-435. Springer, (2015)You Can Glimpse but You Cannot Identify: Protect IoT Devices From Being Fingerprinted., , , , and . IEEE Trans. Dependable Secur. Comput., 21 (3): 1210-1223 (May 2024)A Lightweight Certificateless Non-interactive Authentication and Key Exchange Protocol for IoT Environments., , , , , and . ISCC, page 1-7. IEEE, (2021)Traffic Sign Recognition Based on Semantic Scene Understanding and Structural Traffic Sign Location., , , , , and . IEEE Trans. Intell. Transp. Syst., 23 (9): 15794-15807 (2022)Analyses of several recently proposed group key management schemes., , , and . Secur. Commun. Networks, 8 (2): 136-148 (2015)