Author of the publication

PSSPR: A source location privacy protection scheme based on sector phantom routing in WSNs.

, , , , , and . Int. J. Intell. Syst., 37 (2): 1204-1221 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data Confirmation Scheme based on Auditable CP-ABE., , and . iThings/GreenCom/CPSCom/SmartData/Cybermatics, page 439-443. IEEE, (2022)Blockchain Private Key Storage Algorithm Based on Image Information Hiding., , , , and . ICAIS (4), volume 11635 of Lecture Notes in Computer Science, page 542-552. Springer, (2019)High VHL Expression Reverses Warburg Phenotype and Enhances Immunogenicity in Kidney Tumor Cells., , , , , , , and . Genom. Proteom. Bioinform., 20 (4): 657-669 (August 2022)A Low Energy-Consuming Security Data Aggregation Protocol., , , and . ML4CS (1), volume 12486 of Lecture Notes in Computer Science, page 547-557. Springer, (2020)A Dummy Location Selection Algorithm Based on Location Semantics and Physical Distance., , , , and . ISPEC, volume 13107 of Lecture Notes in Computer Science, page 283-295. Springer, (2021)Adversarial Attack Method Based on Dual- frequency Domain Transformation., , , , , and . DASC/PiCom/CBDCom/CyberSciTech, page 543-548. IEEE, (2023)Using information entropy to analyze secure multi-party computation protocol., , , , and . DASC/PiCom/CBDCom/CyberSciTech, page 312-318. IEEE, (2021)A rational delegating computation protocol based on reputation and smart contract., , , , and . J. Cloud Comput., 10 (1): 51 (2021)The optimal attack-defense scheme for secret sharing., , , and . iThings/GreenCom/CPSCom/SmartData/Cybermatics, page 363-367. IEEE, (2022)Targeted Universal Adversarial Attack Based on Fourier Transform., , , , and . DSPP (1), volume 15215 of Lecture Notes in Computer Science, page 244-259. Springer, (2024)