Author of the publication

Autonomously Vehicle Network PIDs Parsing to Support Threat Monitoring and Early Warning Research.

, , , , and . ICCE-TW, page 1-2. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Autonomously Vehicle Network PIDs Parsing to Support Threat Monitoring and Early Warning Research., , , , and . ICCE-TW, page 1-2. IEEE, (2021)Low-Complexity Bit-Parallel Systolic Multipliers over GF(2m)., , , and . SMC, page 1160-1165. IEEE, (2006)Combined circuit architecture for computing normal basis and montgomery multiplications over GF(2m)., , and . Mobility Conference, page 46. ACM, (2008)A 130.7mm2 2-layer 32Gb ReRAM memory device in 24nm technology., , , , , , , , , and 37 other author(s). ISSCC, page 210-211. IEEE, (2013)Recent Advances in Security and Privacy for Wireless Sensor Networks., , , , , and . J. Sensors, (2015)An Anonymous and Self-Verified Mobile Authentication with Authenticated Key Agreement for Large-Scale Wireless Networks., and . IEEE Trans. Wirel. Commun., 9 (11): 3346-3353 (2010)A self-encryption mechanism for authentication of roaming and teleconference services., and . IEEE Trans. Wirel. Commun., 2 (2): 400-407 (2003)Recent Advances in Security and Privacy for Wireless Sensor Networks 2016., , , , , and . J. Sensors, (2017)Ball-Grid-Array Chip Defects Detection and Classification Using Patch-based Modified YOLOv3., , , and . TAAI, page 1-6. IEEE, (2019)Reversible Data Hiding Scheme Based on Quad-Tree and Pixel Value Ordering., , , , and . IEEE Access, (2019)