Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Communication for AMI on Basis of ECC and ESP., , and . ICCSP, page 44-48. ACM, (2017)Optimized Information Transmission Scheduling Strategy Oriented to Advanced Metering Infrastructure., , and . J. Networks, 8 (1): 245-252 (2013)Magnetic Circuit Modeling and Analysis of Unilateral Axle-Counting Sensor., , , and . IEEE Access, (2018)A Protection Method Based on Message Identification and Flow Monitoring for Managing the Congestion Arising From Network Attacks on Smart Substation., , , and . IEEE Communications Letters, 22 (11): 2214-2217 (2018)A multimodal dual-fusion entity extraction model for large and complex devices., , , and . Comput. Commun., (October 2023)Enhancing Security and Flexibility in the Industrial Internet of Things: Blockchain-Based Data Sharing and Privacy Protection., , , , and . Sensors, 24 (3): 1035 (February 2024)Analysis of data model communication performance based on gated dispatch network simulation model., , , , , and . EITCE, page 573-578. ACM, (2021)Quantum Varying Deficit Round Robin Scheduling Over Priority Queues., and . CIS, page 252-256. IEEE Computer Society, (2007)Multi-agent trust-based intrusion detection scheme for wireless sensor networks., , , , and . Comput. Electr. Eng., (2017)Study on Communication Service Strategy for Congestion Issue in Smart Substation Communication Network., , , , and . IEEE Access, (2018)