Cited By
View all- An XZhou XLü XLin FYang L(2018)Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MECWireless Communications & Mobile Computing10.1155/2018/74720952018Online publication date: 14-Jan-2018
- Li XNiu JKhan MLiao JZhao X(2016)Robust three-factor remote user authentication scheme with key agreement for multimedia systemsSecurity and Communication Networks10.1002/sec.9619:13(1916-1927)Online publication date: 10-Sep-2016