Author of the publication

Model Protection Scheme Against Distillation Attack in Internet of Vehicles.

, , , and . EAI Endorsed Trans. e Learn., (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Model Protection Scheme Against Distillation Attack in Internet of Vehicles., , , and . EAI Endorsed Trans. e Learn., (2023)Sensing-enabled defenses to RFID unauthorized reading and relay attacks without changing the usage model., , , , , , and . PerCom, page 227-234. IEEE Computer Society, (2012)Defending AUTOSAR Safety Critical Systems Against Code Reuse Attacks., and . AutoSec@CODASPY, page 15-18. ACM, (2019)Practical forward secure sequential aggregate signatures.. AsiaCCS, page 341-352. ACM, (2008)A new approach to secure logging, and . Trans. Storage, 5 (1): 1--21 (2009)A Novel Variability-Rich Scheme for Software Updates of Automotive Systems., , and . IEEE Access, (2024)IRRES: Intrusion-Resilient Remote Email Storage., and . ICDCS Workshops, page 72-76. IEEE Computer Society, (2010)Secure Data Retrieval of Outsourced Data with Complex Query Support., , and . ICDCS Workshops, page 481-490. IEEE Computer Society, (2012)A Middleware Services Simulation Platform for Wireless Sensor Networks., , , , and . ICDCS Workshops, page 168-173. IEEE Computer Society, (2008)Efficient Object-Based Stream Authentication., , and . INDOCRYPT, volume 2551 of Lecture Notes in Computer Science, page 354-367. Springer, (2002)