Author of the publication

Secure Chaotic Maps-based Authentication Scheme for Real-Time Data Access In Internet of Things.

, , and . Cyber Security, page 1-8. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Eavesdropper: A Framework for Detecting the Location of the Processed Result in Hadoop., , , , , and . ICICS, volume 9543 of Lecture Notes in Computer Science, page 458-466. Springer, (2015)The Automatic Text Classification Method Based on BERT and Feature Union., , , , , and . ICPADS, page 774-777. IEEE, (2019)Parameter analysis of chirplet transform and high-resolution time-frequency representation via chirplets combination., , , , and . Signal Process., (2023)Reveal the Mathematical Structures of Honeyword Security Metrics., , , and . CoRR, (2023)Word-Graph2vec: An efficient word embedding approach on word co-occurrence graph using random walk sampling., , , and . CoRR, (2023)Phase-matching quantum key distribution based on heralded pair-coherent source., , , , , and . Quantum Inf. Process., 22 (1): 37 (2023)An Improved GAN-based Depth Estimation Network for Face Anti-Spoofing., , , and . ICCAI, page 323-328. ACM, (2023)Optimization of Antenna Design Using the Artificial Neural Network and the Simulated Annealing Algorithm., , , , and . ComComAP, page 119-122. IEEE, (2021)Machine Learning for Variance Reduction in Online Experiments., , , , , and . NeurIPS, page 8637-8648. (2021)Secure Erasure and Code Update in Legacy Sensors., and . TRUST, volume 9229 of Lecture Notes in Computer Science, page 283-299. Springer, (2015)