Author:
Ye Zhu ,Xinwen Fu ,Graham Bryan,Bettati Riccardo,Wei Zhao
Publisher
Institute of Electrical and Electronics Engineers (IEEE)
Subject
Computational Theory and Mathematics,Hardware and Architecture,Signal Processing
Cited by
31 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Study Report of Tor Antiforensic Techniques;Proceedings of the 2nd International Conference on Cognitive and Intelligent Computing;2023
2. An optimal LT code for network flow watermarking;Third International Conference on Computer Science and Communication Technology (ICCSCT 2022);2022-12-29
3. A Survey on Threat-Modeling Techniques: Protected Objects and Classification of Threats;Symmetry;2022-03-08
4. Quantifying unlinkability in multi-hop wireless networks;Computer Communications;2022-01
5. Current Methods of Privacy Protection in IoTs;Privacy Preservation in IoT: Machine Learning Approaches;2022