Author of the publication

On-Demand Anonymous Access and Roaming Authentication Protocols for 6G Satellite-Ground Integrated Networks.

, , , , and . Sensors, 23 (11): 5075 (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Study and Realization of Vulnerability-Oriented Fuzzing Technology for ActiveX Plug-Ins., and . IMIS, volume 773 of Advances in Intelligent Systems and Computing, page 922-931. Springer, (2018)A Webshell Detection Technology Based on HTTP Traffic Analysis., , and . IMIS, volume 773 of Advances in Intelligent Systems and Computing, page 336-342. Springer, (2018)A taint based approach for automatic reverse engineering of gray-box file formats., , , and . Soft Comput., 20 (9): 3563-3578 (2016)Malware Detection Using Machine Learning Based on the Combination of Dynamic and Static Features., , , and . ICCCN, page 1-6. IEEE, (2018)A Malware Detection Method Based on Sandbox, Binary Instrumentation and Multidimensional Feature Extraction., , , and . BWCCA, volume 12 of Lecture Notes on Data Engineering and Communications Technologies, page 427-438. Springer, (2017)Static vulnerability mining of IoT devices based on control flow graph construction and graph embedding network., , , , and . Comput. Commun., (2023)Terminal Access Data Anomaly Detection Based on GBDT for Power User Electric Energy Data Acquisition System., , , , and . EIDWT, volume 29 of Lecture Notes on Data Engineering and Communications Technologies, page 137-147. Springer, (2019)Trustworthy Network Anomaly Detection Based on an Adaptive Learning Rate and Momentum in IIoT., , , , , and . IEEE Trans. Ind. Informatics, 16 (9): 6182-6192 (2020)Learning URL Embedding for Malicious Website Detection., , , , , and . IEEE Trans. Ind. Informatics, 16 (10): 6673-6681 (2020)A novel vulnerability detection method for ZigBee MAC layer., , , , and . Int. J. Grid Util. Comput., 4 (2/3): 134-143 (2013)