From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

One Secure IoT Scheme for Protection of True Nodes., , , , , и . SmartCom, том 11344 из Lecture Notes in Computer Science, стр. 143-152. Springer, (2018)Vehicular Networking: Protecting Vehicles from Imminent Cyber Threats., и . IEEE Commun. Stand. Mag., 2 (4): 72 (2018)Drones in the Era of V2X Communications., и . IEEE Commun. Stand. Mag., 3 (1): 10 (2019)Toward Vehicular Digital Forensics From Decentralized Trust: An Accountable, Privacy-Preserving, and Secure Realization., , , , и . IEEE Internet Things J., 9 (9): 7009-7024 (2022)A distributed approach to enabling privacy-preserving model-based classifier training., , , , и . Knowl. Inf. Syst., 20 (2): 157-185 (2009)A Multikernel and Metaheuristic Feature Selection Approach for IoT Malware Threat Hunting in the Edge Layer., , , , , и . IEEE Internet Things J., 8 (6): 4540-4547 (2021)An effective behavior-based Android malware detection system., , и . Secur. Commun. Networks, 8 (12): 2079-2089 (2015)Privacy-Enhancing Fog Computing and Its Applications, , и . Springer Briefs in Electrical and Computer Engineering Springer, (2018)The Analysis and Implication of Data Deduplication in Digital Forensics., и . CSS, том 13172 из Lecture Notes in Computer Science, стр. 198-215. Springer, (2021)Compositional Text-to-Image Synthesis with Attention Map Control of Diffusion Models., , , , , и . AAAI, стр. 5544-5552. AAAI Press, (2024)