Author of the publication

A Comparative Study on the Security of Cryptocurrency Wallets in Android System.

, , , , , and . TrustCom, page 399-406. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Simulation and Analysis of DDoS in Active Defense Environment., , and . CIS, volume 4456 of Lecture Notes in Computer Science, page 878-886. Springer, (2006)Indirect Elicitation of NIN-AND Trees in Causal Model Acquisition., , , , and . SUM, volume 6929 of Lecture Notes in Computer Science, page 261-274. Springer, (2011)Entity Search Based on the Representation Learning Model With Different Embedding Strategies., and . IEEE Access, (2017)Clonewise - Detecting Package-Level Clones Using Machine Learning., , and . SecureComm, volume 127 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 197-215. Springer, (2013)Effective and efficient itemset pattern summarization: regression-based approaches., , , and . KDD, page 399-407. ACM, (2008)Succinct summarization of transactional databases: an overlapped hyperrectangle scheme., , , and . KDD, page 758-766. ACM, (2008)Collective Additive Tree Spanners of Homogeneously Orderable Graphs., , and . LATIN, volume 4957 of Lecture Notes in Computer Science, page 555-567. Springer, (2008)Multi-label Recommendation of Web Services with the Combination of Deep Neural Networks., , , , and . CollaborateCom, volume 292 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 133-150. Springer, (2019)Chameleon Hashing for Secure and Privacy-Preserving Vehicular Communications., , and . IEEE Trans. Parallel Distributed Syst., 25 (11): 2794-2803 (2014)A Collaborative Stealthy DDoS Detection Method Based on Reinforcement Learning at the Edge of Internet of Things., , , , , and . IEEE Internet Things J., 10 (20): 17934-17948 (October 2023)