Author of the publication

Universally Composable Key Bootstrapping and Secure Communication Protocols for the Energy Internet.

, , , , , and . IEEE Trans. Inf. Forensics Secur., 14 (8): 2113-2127 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GE-AdvGAN: Improving the transferability of adversarial samples by gradient editing-based adversarial generative model., , , , , , , and . CoRR, (2024)A Novel Graph-based Computation Offloading Strategy for Workflow Applications in Mobile Edge Computing., , , , and . CoRR, (2021)A Continued Pretrained LLM Approach for Automatic Medical Note Generation., , , , , , , and . CoRR, (2024)ServiceNet: A P2P Service Network., , , , , , and . CoRR, (2020)PanoViT: Vision Transformer for Room Layout Estimation from a Single Panoramic Image., , , , , and . CoRR, (2022)Enhancing Quantum Adversarial Robustness by Randomized Encodings., , , and . CoRR, (2022)Video-Based Visible-Infrared Person Re-Identification With Auxiliary Samples., , , , and . IEEE Trans. Inf. Forensics Secur., (2024)A novel statistical time-series pattern based interval forecasting strategy for activity durations in workflow systems., , , , , , and . J. Syst. Softw., 84 (3): 354-376 (2011)Automatic age estimation based on deep learning algorithm., , and . Neurocomputing, (2016)Applying blockchain for primary financial market: A survey., , , , , , , and . IET Blockchain, 1 (2-4): 65-81 (2021)