Search

Your search keyword '"Fushan WEI"' showing total 116 results

Search Constraints

Start Over You searched for: Author "Fushan WEI" Remove constraint Author: "Fushan WEI"
Sorry, I don't understand your search. ×
116 results on '"Fushan WEI"'

Search Results

1. GRU-based multi-scenario gait authentication for smartphones

2. A Novel Estimator for TDOA and FDOA Positioning of Multiple Disjoint Sources in the Presence of Calibration Emitters

3. On the use of calibration emitters for TDOA source localization in the presence of synchronization clock bias and sensor location errors

4. Model Learning and Model Checking of IPSec Implementations for Internet of Things

5. CBD: A Deep-Learning-Based Scheme for Encrypted Traffic Classification with a General Pre-Training Method

6. A Secure User Authentication Scheme against Smart-Card Loss Attack for Wireless Sensor Networks Using Symmetric Key Techniques

27. LightSEEN: Real-Time Unknown Traffic Discovery via Lightweight Siamese Networks

28. Automated State-Machine-Based Analysis of Hostname Verification in IPsec Implementations

33. An Intelligent Terminal Based Privacy-Preserving Multi-Modal Implicit Authentication Protocol for Internet of Connected Vehicles

34. CLD-Net: A Network Combining CNN and LSTM for Internet Encrypted Traffic Classification

35. Privacy-Preserving Implicit Authentication Protocol Using Cosine Similarity for Internet of Things

36. Efficient cloud-aided verifiable secret sharing scheme with batch verification for smart cities

37. A Risk Analysis Framework for Social Engineering Attack Based on User Profiling

38. A Mobile Intelligent Terminal Based Anonymous Authenticated Key Exchange Protocol for Roaming Service in Global Mobility Networks

39. Robust Direct position determination against sensor gain and phase errors with the use of calibration sources

40. OpenCBD: A Network-Encrypted Unknown Traffic Identification Scheme Based on Open-Set Recognition

42. A Certificateless-Based Authentication and Key Agreement Scheme for IIoT Cross-Domain

44. Iterative constrained weighted least squares estimator for TDOA and FDOA positioning of multiple disjoint sources in the presence of sensor position and velocity uncertainties

45. Model Learning and Model Checking of IPSec Implementations for Internet of Things

46. Bitcoin Theft Detection Based on Supervised Machine Learning Algorithms

47. Security and Privacy for Edge-Assisted Internet of Things Security Proof for the SKKE Protocol

48. Security Analysis and Design of Authentication Key Agreement Protocol in Medical Internet of Things

50. A Survey on Blockchain Anomaly Detection Using Data Mining Techniques

Catalog

Books, media, physical & digital resources