Author of the publication

Security of Cyber Physical System.

, , , and . CWSN, volume 501 of Communications in Computer and Information Science, page 558-567. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HCCR by contour-based elastic mesh fuzzy feature.. DRR, volume 6067 of SPIE Proceedings, page 606703. SPIE, (2006)A new method of post-evaluation researches on land consolidation project based on rough sets., , and . ICMLC, page 409-413. IEEE, (2013)Improved joint carrier and sampling frequency offset estimation scheme for OFDM systems., , and . GLOBECOM, page 2315-2319. IEEE, (2003)Peer to Peer Anti-Money Laundering Resource Allocation Based on Semi-Markov Decision Process., , , , and . GLOBECOM, page 1-6. IEEE, (2015)An energy efficient privacy-preserving content sharing scheme in mobile social networks., , , , , and . Pers. Ubiquitous Comput., 20 (5): 833-846 (2016)Encrypted digital watermarking algorithm for quick response code using discrete cosine transform and singular value decomposition., , , and . Multim. Tools Appl., 80 (7): 10285-10300 (2021)A Research of Reduction Algorithm for Support Vector Machine., and . ICSI (2), volume 6729 of Lecture Notes in Computer Science, page 356-362. Springer, (2011)A Content-based Robust Mode Decision Scheme for Internet Videophone Applications., , and . DCC, page 408. IEEE Computer Society, (2007)An efficient multicast protocol in mobile IPv6 networks., , , , and . WCNC, page 155-159. IEEE, (2004)MotePlat: A Monitoring and Control Platform for Wireless Sensor Networks., , , and . GCC Workshops, page 452-458. IEEE Computer Society, (2006)