Author of the publication

The vulnerability and enhancement of AKA protocol for mobile authentication in LTE/5G networks.

, and . Comput. Networks, (June 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Image Dehazing Algorithm Based on Atmosphere Scatters Approximation Model., , , , and . ICONIP (5), volume 7667 of Lecture Notes in Computer Science, page 159-168. Springer, (2012)Conditions for Regional Frequency Stability in Power Systems - Part II: Applications., , and . CoRR, (2020)An extended TODIM method for multiple attribute group decision-making based on 2-dimension uncertain linguistic Variable., and . Complex., 21 (5): 20-30 (2016)Event-triggered distributed MPC for voltage control of an islanded microgrid., , and . CoRR, (2020)Bidirectional channel estimation using adaptive pilots., , and . ISIT, page 2381-2385. IEEE, (2012)Temporal Prediction Model for Social Information Propagation., , , , and . IJCRS (1), volume 10313 of Lecture Notes in Computer Science, page 465-476. Springer, (2017)Application on Cold Chain Logistics Routing Optimization Based on Improved Genetic Algorithm., , , , and . Automatic Control and Computer Sciences, 53 (2): 169-180 (2019)Multiple-Attribute Group Decision-Making Method Based on the Linguistic Intuitionistic Fuzzy Density Hybrid Weighted Averaging Operator., and . Int. J. Fuzzy Syst., 21 (1): 213-231 (2019)Robust multi-scale ship tracking via multiple compressed features fusion., and . Signal Process. Image Commun., (2015)Multimedia Monitoring System of Obstructive Sleep Apnea via a Deep Active Learning Model., , , , , and . IEEE Multim., 29 (3): 48-56 (2022)