Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Analysis of Peer-to-Peer Network Security., and . GCA, page 131-150. CSREA Press, (2005)Securing Traffic-Related Messages Exchange Against Inside-and-Outside Collusive Attack in Vehicular Networks., , , , and . IEEE Internet Things J., 6 (6): 9979-9992 (2019)The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved., , , , and . IEEE Internet Things J., 6 (2): 1606-1616 (2019)Privacy-Preserving Federated Learning in Fog Computing., , , , , and . IEEE Internet Things J., 7 (11): 10782-10793 (2020)Construction of Near-Complementary Sequences with Low PMEPR for Peak Power Control in OFDM., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 95-A (11): 1881-1887 (2012)On the Laplacian, the Kirchhoff Index, and the Number of Spanning Trees of the Linear Pentagonal Derivation Chain., , , and . Axioms, 11 (6): 278 (2022)Generating Chaos with Saddle-Focus Homoclinic Orbit., , and . Int. J. Bifurc. Chaos, 34 (1): 2450011:1-2450011:12 (January 2024)Group Consensus in Finite Time for Fractional Multiagent Systems With Discontinuous Inherent Dynamics Subject to Hölder Growth., , and . IEEE Trans. Cybern., 52 (6): 4161-4172 (2022)One-round Secure Key Exchange Protocol With Strong Forward Secrecy., , , and . KSII Trans. Internet Inf. Syst., 10 (11): 5639-5653 (2016)Securing Cooperative Spectrum Sensing against Rational SSDF Attack in Cognitive Radio Networks., , , and . KSII Trans. Internet Inf. Syst., 8 (1): 1-17 (2014)