Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Self-assisted complete analysis of three-photon hyperentangled Greenberger-Horne-Zeilinger states with nitrogen-vacancy centers in microcavities., , and . Quantum Information Processing, 17 (7): 172 (2018)Security Related Data Mining., and . CIT, page 775-782. IEEE Computer Society, (2014)Corrigendum to "Does multitasking with mobile phones affect learning? A review" [Comput. Hum. Behav. 54 (2016) 34-42]., and . Computers in Human Behavior, (2016)A Research Model for Human-Computer Trust Interaction., , and . TrustCom, page 274-281. IEEE Computer Society, (2011)Unwanted Traffic Control via Global Trust Management., , and . TrustCom, page 647-654. IEEE Computer Society, (2011)Data-Driven Decision-Making (D3M): Framework, Methodology, and Directions., , , and . IEEE Trans. Emerging Topics in Comput. Intellig., 3 (4): 286-296 (2019)Identifying suspicious groups of affiliated-transaction-based tax evasion in big data., , , , and . Inf. Sci., (2019)A Survey on Security, Privacy, and Trust in Mobile Crowdsourcing., , , , , and . IEEE Internet of Things Journal, 5 (4): 2971-2992 (2018)Flexible data access control in D2D communications., , , and . Future Generation Comp. Syst., (2018)Security Measurements of Cyber Networks., , , and . Security and Communication Networks, (2018)