Author of the publication

A Hybrid and Efficient Scheme of Multicast Source Authentication.

, , , and . SNPD (2), page 123-125. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An effective soft computing technology based on belief-rule-base and particle swarm optimization for tipping paper permeability measurement., , , , , and . J. Ambient Intelligence and Humanized Computing, 10 (3): 841-850 (2019)Constructing multi-modality and multi-classifier radiomics predictive models through reliable classifier fusion., , , , , , , and . CoRR, (2017)A Hybrid and Efficient Scheme of Multicast Source Authentication., , , and . SNPD (2), page 123-125. IEEE Computer Society, (2007)A New BRB-ER-Based Model for Assessing the Lives of Products Using Both Failure Data and Expert Knowledge., , , , and . IEEE Trans. Systems, Man, and Cybernetics: Systems, 46 (11): 1529-1543 (2016)AutoBRB: An automated belief rule base model for pathologic complete response prediction in gastric cancer., , , and . Comput. Biol. Medicine, (2022)Secure Design of RFID Tags in the New Type License Plates Automatic Identification System., , , , and . ISCSCT (1), page 694-697. IEEE Computer Society, (2008)A New Approach For Source Authentication Of Multicast Data., , , and . Security and Management, page 118-121. CSREA Press, (2006)Pedestrian tracking by learning deep features., , , , and . J. Visual Communication and Image Representation, (2018)A Model for Hidden Behavior Prediction of Complex Systems Based on Belief Rule Base and Power Set., , , , , and . IEEE Trans. Systems, Man, and Cybernetics: Systems, 48 (9): 1649-1655 (2018)Improved Unsupervised Anomaly Detection Algorithm., , , , and . RSKT, volume 5009 of Lecture Notes in Computer Science, page 532-539. Springer, (2008)