Author of the publication

Time-Efficient Cloning Attacks Identification in Large-Scale RFID Systems.

, , , , , and . Secur. Commun. Networks, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Time-Efficient Cloning Attacks Identification in Large-Scale RFID Systems., , , , , and . Secur. Commun. Networks, (2017)Shipborne ZTD Retrieval With a Low-Cost GNSS Receiver., , , , , , and . IEEE Geosci. Remote. Sens. Lett., (2024)Feature pyramid network for diffusion-based image inpainting detection., , , and . Inf. Sci., (2021)Modified Gram-Schmidt Method-Based Variable Projection Algorithm for Separable Nonlinear Models., , , and . IEEE Trans. Neural Networks Learn. Syst., 30 (8): 2410-2418 (2019)JND-Based Perceptual Optimization For Learned Image Compression., , , and . CoRR, (2023)Identification of Two-Dimensional Causal Systems With Missing Output Data via Expectation-Maximization Algorithm., , and . IEEE Trans. Ind. Informatics, 17 (8): 5185-5196 (2021)Moon Imaging Technique and Experiments Based on Sanya Incoherent Scatter Radar., , , , , , , , , and 1 other author(s). IEEE Trans. Geosci. Remote. Sens., (2022)Transformations between some special matrices.. Comput. Math. Appl., 59 (8): 2676-2695 (2010)Parameter estimation for a special class of nonlinear systems by using the over-parameterisation method and the linear filter., , , , and . Int. J. Systems Science, 50 (9): 1689-1702 (2019)Process variability and inherent efficiency enhancement in industrial processes: Two case studies in pulp and paper industry., and . CCA, page 1262-1269. IEEE, (2011)