Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TrustAccess: A Trustworthy Secure Ciphertext-Policy and Attribute Hiding Access Control Scheme Based on Blockchain., , , , and . IEEE Trans. Veh. Technol., 69 (6): 5784-5798 (2020)Demons in the Shared Kernel: Abstract Resource Attacks Against OS-level Virtualization., , , , , , , , , and 1 other author(s). CCS, page 764-778. ACM, (2021)Attacks are Forwarded: Breaking the Isolation of MicroVM-based Containers Through Operation Forwarding., , , , , , , and . USENIX Security Symposium, page 7517-7534. USENIX Association, (2023)MT-CNN: A Classification Method of Encrypted Traffic Based on Semi-Supervised Learning., , , , and . GLOBECOM, page 7538-7543. IEEE, (2023)Protecting Your Offloading Preference: Privacy-aware Online Computation Offloading in Mobile Blockchain., , , and . IWQoS, page 1-10. IEEE, (2021)SEMMI: Multi-party Security Decision-making Scheme Under the Internet of Medical Things., , , , and . ICC, page 2792-2797. IEEE, (2022)Social Networks Based Robust Federated Learning for Encrypted Traffic Classification., , , , , , and . ICC, page 4937-4942. IEEE, (2023)Privacy-preserving Diverse Keyword Search and Online Pre-diagnosis in Cloud Computing., , , , and . SERVICES, page 19. IEEE, (2021)SRDPV: secure route discovery and privacy-preserving verification in MANETs., , and . Wireless Networks, 25 (4): 1731-1747 (2019)Measurement on the border effect of transboundary water resources: A case study of China's Zhanghe basin., , , and . SMC, page 1928-1934. IEEE, (2014)