Issue Date | Title | Author(s) |
2020-09-01 | A Unified Analytical model for proof-of-X schemes | Yu, G; Zha, X; Wang, X; Ni, W; Yu, K; Zhang, JA; Liu, RP |
2017-10-01 | Collaborative Authentication in Decentralized Dense Mobile Networks with Key Predistribution | Zha, X; Ni, W; Zheng, K; Liu, RP; Niu, X |
2019-05-01 | Vulnerabilities of massive MIMO systems to pilot contamination attacks | Akgun, B; Krunz, M; Ozan Koyluoglu, O |
2018-09-01 | The impact of link duration on the integrity of distributed mobile networks | Zha, X; Ni, W; Wang, X; Liu, RP; Guo, YJ; Niu, X; Zheng, K |
2018-01-01 | Enabling Privacy-Preserving Shortest Distance Queries on Encrypted Graph Data | Liu, C; Zhu, L; He, X; Chen, J |
2022-09-01 | A comprehensive survey of covert communication techniques, limitations and future challenges | Makhdoom, I; Abolhasan, M; Lipman, J |
2022-01-01 | Dispersed Pixel Perturbation-Based Imperceptible Backdoor Trigger for Image Classifier Models | Wang, Y; Zhao, M; Li, S; Yuan, X; Ni, W |
2022-01-01 | Session Invariant EEG Signatures using Elicitation Protocol Fusion and Convolutional Neural Network | Debie, E; Moustafa, N; Vasilakos, A |
2016-11-01 | Private and Secure Tag Access for Large-Scale RFID Systems | Sun, MT; Sakai, K; Ku, WS; Lai, TH; Vasilakos, AV |
2016-09-01 | Formal Verification of the xDAuth Protocol | Alam, Q; Tabbasum, S; Malik, SUR; Alam, M; Ali, T; Akhunzada, A; Khan, SU; Vasilakos, AV; Buyya, R |