Author of the publication

Time-Efficient Cloning Attacks Identification in Large-Scale RFID Systems.

, , , , , and . Secur. Commun. Networks, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Auxiliary models based multi-innovation gradient identification with colored measurement noises., , and . ICRA, page 448-452. IEEE, (2009)Coupled Least Squares Identification Algorithms for Multivariate Output-Error Systems., and . Algorithms, 10 (1): 12 (2017)Transformations between some special matrices.. Comput. Math. Appl., 59 (8): 2676-2695 (2010)Identification of Two-Dimensional Causal Systems With Missing Output Data via Expectation-Maximization Algorithm., , and . IEEE Trans. Ind. Informatics, 17 (8): 5185-5196 (2021)JND-Based Perceptual Optimization For Learned Image Compression., , , and . CoRR, (2023)Modified Gram-Schmidt Method-Based Variable Projection Algorithm for Separable Nonlinear Models., , , and . IEEE Trans. Neural Networks Learn. Syst., 30 (8): 2410-2418 (2019)Time-Efficient Cloning Attacks Identification in Large-Scale RFID Systems., , , , , and . Secur. Commun. Networks, (2017)Layer Model and Algorithm of Organization Authorization Based on Position Network., , and . Computer and Information Science, 2 (1): 25-34 (2009)Parameter estimation for a special class of nonlinear systems by using the over-parameterisation method and the linear filter., , , , and . Int. J. Systems Science, 50 (9): 1689-1702 (2019)Process variability and inherent efficiency enhancement in industrial processes: Two case studies in pulp and paper industry., and . CCA, page 1262-1269. IEEE, (2011)