Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application of Numerical Simulation Technology to Prediction of Aerodynamic Dipole Acoustics Source on Automobile Surface., and . ICDMA, page 216-220. IEEE Computer Society, (2011)Development and Optimisation of Wireless Indoor localisation for the IoT Solutions. University of Technology Sydney, Australia, (2021)Diffusion features of aviation fuel fire in an obstructed nacelle., , , and . Int. J. Wirel. Mob. Comput., 19 (2): 163-177 (2020)Stochastic collaborative planning method for electric vehicle charging stations., , , , and . SmartGridComm, page 503-508. IEEE, (2016)SandboxNet: A Learning-Based Malicious Application Detection Framework in SDN Networks., , , and . J. Inf. Sci. Eng., 38 (6): 1189-1211 (2022)Social itinerary recommendation from user-generated digital trails., , , and . Pers. Ubiquitous Comput., 16 (5): 469-484 (2012)Achieving secure and convenient WLAN sharing in personal., , , , , , and . IET Inf. Secur., 14 (6): 733-744 (2020)Smart home: Keeping privacy based on Air-Padding., , , , , , and . IET Inf. Secur., 15 (2): 156-168 (2021)Performance Analysis of IEEE 802.11 DCF in Imperfect Channels., , , and . IEEE Trans. Veh. Technol., 55 (5): 1648-1656 (2006)Batch image encryption using cross image permutation and diffusion., , , , , and . J. Inf. Secur. Appl., (February 2024)