Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Object Oriented Property Attestation for Trusted Storage., , , and . CIT (2), page 93-97. IEEE Computer Society, (2009)978-0-7695-3836-5.Security cooperation model based on topology control and time synchronization for wireless sensor networks., , , , , , and . J. Commun. Networks, 21 (5): 469-480 (2019)Temporal Index Scheme of Hyperledger Fabric System in IoT., , , , , and . Wirel. Commun. Mob. Comput., (2021)A Dual-view Attention Neural Network for Assigning Industrial Categories to Academic Patents., , , , and . PACIS, page 73. (2023)Comparison of Five Packet-Sampling-Based Methods for Detecting Elephant Flows., , , and . Trustcom/BigDataSE/ISPA, page 2018-2023. IEEE, (2016)Privacy Preservation in Social Network against Public Neighborhood Attacks., , and . Trustcom/BigDataSE/ISPA, page 1575-1580. IEEE, (2016)Mining Expected Support-Based Frequent Itemsets by Sampling., , , and . SmartIoT, page 64-69. IEEE, (2019)CHAMELEON: Hides privacy in cloud IoT system by LSB and CSE., , , and . Concurr. Comput. Pract. Exp., (2019)A Novel Method for Estimating Flow Length Distributions from Double-Sampled Flow Statistics., , , and . HPCC, page 568-572. IEEE, (2010)DAG Cluster Scheduling Algorithm for Grid Computing., , , and . CSE, page 632-636. IEEE Computer Society, (2011)