Author of the publication

UAV-enabled friendly jamming scheme to secure industrial Internet of Things.

, , , , and . Journal of Communications and Networks, 21 (5): 481-490 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Fuzzy Extension of OWL for Vague Knowledge., , , and . FSKD (4), page 312-316. IEEE Computer Society, (2007)0-7695-2874-0.Spatio-temporal deep learning method for ADHD fMRI classification., , , , , , , and . Inf. Sci., (2019)A Lightweight Anonymous Mobile User Authentication Scheme for Smart Grid., , , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 821-827. IEEE, (2018)Multi-Layer Network Local Community Detection Based on Influence Relation., , , , , and . IEEE Access, (2019)Robust Privacy-Preserving Mutual Authenticated Key Agreement Scheme in Roaming Service for Global Mobility Networks., , , and . IEEE Systems Journal, 13 (2): 1454-1465 (2019)Understanding Effects of Collaborations in Developing Mobile Computing Systems: Popularity, Efficiency, and Quality., , , , , and . IEEE Access, (2019)One-round provably secure yoking-proof for RFID applications., , , and . Concurrency and Computation: Practice and Experience, (2019)Privacy-preserving categorization of mobile applications based on large-scale usage data., , , , , and . Inf. Sci., (2020)Using Sparse Representation to Detect Anomalies in Complex WSNs., , , , , , , and . ACM TIST, 10 (6): 64:1-64:18 (2019)HUCDO: A Hybrid User-centric Data Outsourcing Scheme., , , , , , , , , and 1 other author(s). ACM Trans. Cyber Phys. Syst., 4 (3): 35:1-35:23 (2020)