Author of the publication

CO-RTO: Achieving efficient data retransmission in VNDN by correlations implied in names.

, , , and . INFOCOM Workshops, page 366-371. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FlowCop: Detecting "Stranger" in Network Traffic Classification., , , , and . ICCCN, page 1-9. IEEE, (2018)MG-Conv: A spatiotemporal multi-graph convolutional neural network for stock market index trend prediction., , , , and . Comput. Electr. Eng., (2022)Breaking and Repairing of an Anonymous and Traceable Communication Protocol for Vehicular Ad Hoc Networks., and . CIT, page 88-93. IEEE Computer Society, (2012)SmartBuoy: A Machine Learning-Based Detection Method for Interest Flooding Attacks in VNDN., , , , , and . UbiSec, volume 2034 of Communications in Computer and Information Science, page 236-252. Springer, (2023)S-chain: A Shard-based Blockchain Scheme for Cross-chain Supervision., , , , and . ICPADS, page 667-674. IEEE, (2023)GateKeeper: An UltraLite malicious traffic identification method with dual-aspect optimization strategies on IoT gateways., , , , , , and . Comput. Networks, (2024)Gradient structural similarity based gradient filtering for multi-modal image fusion., , , , and . Inf. Fusion, (2020)On the Security of an Enhanced ID-Based Anonymous Proxy Signature Scheme in ICCAE2010., and . INCoS, page 245-250. IEEE, (2012)A Privacy-Preserving Authentication Scheme for VANETs based on Consortium Blockchain., , , , and . VTC Fall, page 1-6. IEEE, (2020)Converting Ptolemy II Models to SpaceEx for Applied Verification., , , , and . ICA3PP (1), volume 8630 of Lecture Notes in Computer Science, page 669-683. Springer, (2014)