Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Summary of Research on Information Security Protection of Smart Grid., and . ICAIS (2), volume 12240 of Lecture Notes in Computer Science, page 365-379. Springer, (2020)Smart Contract Firewall: Protecting the on-Chain Smart Contract Projects., , , , , , , , and . GLOBECOM, page 5122-5128. IEEE, (2023)An ICN-Oriented Name-Based Routing Scheme., , , , and . ICYCSEE, volume 503 of Communications in Computer and Information Science, page 101-108. Springer, (2015)Networked Device Identification: A Survey., , and . DSC, page 543-548. IEEE, (2021)Greedy Embedding Strategy for Dynamic Graphs Based on Spanning Tree., , , and . ICCCS (1), volume 11063 of Lecture Notes in Computer Science, page 525-530. Springer, (2018)LocJury: An IBN-Based Location Privacy Preserving Scheme for IoCV., , , , and . IEEE Trans. Intell. Transp. Syst., 22 (8): 5028-5037 (2021)Robust Truth Discovery Against Multi-round Data Poisoning Attacks., , , and . WASA (1), volume 13471 of Lecture Notes in Computer Science, page 258-270. Springer, (2022)Hierarchical Name-based Routing for Content Provider Mobility in ICN., , , , , , and . IWCMC, page 941-946. IEEE, (2023)Preserving Location Privacy in Mobile Edge Computing., , , , and . ICC, page 1-6. IEEE, (2019)Bitcoin Network Size Estimation Based on Coupon Collection Model., , , , , , and . ICAIS (4), volume 11635 of Lecture Notes in Computer Science, page 298-307. Springer, (2019)