Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Generative Adversarial and Spatiotemporal Differential Fusion Method in Radar Echo Extrapolation., , , , , and . Remote. Sens., 15 (22): 5329 (November 2023)A Blockchain-based MQTT Protocol Optimization Algorithm., , and . J. ICT Stand., 11 (2): 135-156 (2023)Building a secure mHealth data sharing infrastructure over NDN., , , , , , , and . ICN, page 114-124. ACM, (2022)A New API in Support of NDN Trust Schema., , , , and . ICN, page 46-54. ACM, (2023)PLI-Sync: Prefetch Loss-Insensitive Sync for NDN Group Streaming., , , , and . ICC, page 1-6. IEEE, (2021)Zone state revocation for DNSSEC., , , and . LSAD@SIGCOMM, page 153-160. ACM, (2007)Designing Hydra with Centralized versus Decentralized Control: A Comparative Study., , , , , , and . IWCI@CoNEXT, page 4-10. ACM, (2021)A Brief Introduction to Named Data Networking., , , , , and . MILCOM, page 1-6. IEEE, (2018)NDNoT: a framework for named data network of things., , , , , , , and . ICN, page 200-201. ACM, (2018)Research on flexible resource access strategy based on block chain technology., , , , , and . ICBCT, page 126-130. ACM, (2022)