Author of the publication

Efficient Secure Access to IEEE 21451 Based Wireless IIoT Using Optimized TEDS and MIB.

, , , and . IECON, page 5221-5227. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computer vision-based food calorie estimation: dataset, method, and experiment., and . CoRR, (2017)Design and Fabrication of a Miniaturized GMI Magnetic Sensor Based on Amorphous Wire by MEMS Technology., , , , and . Sensors, 18 (3): 732 (2018)An Image Super-Resolution Scheme Based on Compressive Sensing with PCA Sparse Representation., , , and . IWDW, volume 7809 of Lecture Notes in Computer Science, page 495-506. Springer, (2012)DeSVig: Decentralized Swift Vigilance Against Adversarial Attacks in Industrial Artificial Intelligence Systems., , , , and . IEEE Trans. Ind. Informatics, 16 (5): 3267-3277 (2020)Semantic Grid Security Solutions Based on Knowledge Base., and . AICT/ICIW, page 90. IEEE Computer Society, (2006)A multi-stage attack mitigation mechanism for software-defined home networks., , , and . IEEE Trans. Consumer Electronics, 62 (2): 200-207 (2016)Multi-feature tracking via adaptive weights., , , and . Neurocomputing, (2016)Overlapping Community Detection Based on Structural Centrality in Complex Networks., , and . IEEE Access, (2017)Security analysis and improvement of a user-friendly remote authentication protocol., , and . Appl. Math. Comput., 168 (1): 47-50 (2005)An alternative class of irreducible polynomials for optimal extension fields., , and . Des. Codes Cryptogr., 60 (2): 171-182 (2011)