Author of the publication

Securing Traffic-Related Messages Exchange Against Inside-and-Outside Collusive Attack in Vehicular Networks.

, , , , and . IEEE Internet Things J., 6 (6): 9979-9992 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Large scale spatial temporal data visualization based on spark and 3D volume rendering., , and . IJCNN, page 1879-1882. IEEE, (2016)Pick-Up Tree Based Route Recommendation from Taxi Trajectories., , , , , and . WAIM, volume 7418 of Lecture Notes in Computer Science, page 471-483. Springer, (2012)Simulation of Continuous Enterprise Energy Consumption Process with Uncertain Factors., , , , and . CCIS, page 502-506. IEEE, (2018)Understanding Customer Behavior in Shopping Mall from Indoor Tracking Data., , , and . CSCWD, page 648-653. IEEE, (2018)Location-Centered House Price Prediction: A Multi-Task Learning Approach., , , , , and . CoRR, (2019)Accurate Human Gesture Sensing With Coarse-Grained RF Signatures., , , , and . IEEE Access, (2019)Quantized state estimation for neural networks with cyber attacks and hybrid triggered communication scheme., , , and . Neurocomputing, (2018)Spotting review spammer groups: A cosine pattern and network based method., , , , and . Concurr. Comput. Pract. Exp., (2018)A pattern-based topic detection and analysis system on Chinese tweets., , , , and . J. Comput. Sci., (2018)A Cloud System for Community Extraction from Super-Large Scale Social Networks., , , , and . WISE (2), volume 8181 of Lecture Notes in Computer Science, page 499-502. Springer, (2013)