Author of the publication

How to protect reader lending privacy under a cloud environment: a technical method.

, , , , and . Libr. Hi Tech, 40 (6): 1746-1765 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel object tracking algorithm by fusing color and depth information based on single valued neutrosophic cross-entropy., , , , , and . J. Intell. Fuzzy Syst., 32 (3): 1775-1786 (2017)SR-HGN: Semantic- and Relation-Aware Heterogeneous Graph Neural Network., , , , and . Expert Syst. Appl., (August 2023)An accuracy-enhanced group recommendation approach based on DEMATEL., , , , , , , and . Pattern Recognit. Lett., (March 2023)Security and Privacy-Enhanced Federated Learning for Anomaly Detection in IoT Infrastructures., , , , , , and . IEEE Trans. Ind. Informatics, 18 (5): 3492-3500 (2022)Resilient Distributed Coordination Control of Multiarea Power Systems Under Hybrid Attacks., , , , and . IEEE Trans. Syst. Man Cybern. Syst., 52 (1): 7-18 (2022)Future Quantum Communications and Networking: A Review and Vision., , , , , and . IEEE Wirel. Commun., 31 (1): 141-148 (February 2024)PECCO: A Profit and Cost-oriented Computation Offloading Scheme in Edge-Cloud Environment with Improved Moth-flame Optimisation., , , , and . CoRR, (2022)An Efficient Approach for Stimulating Cooperation among Nodes in Wireless Sensor Networks., , , , and . IJDSN, 12 (5): 2873439:1-2873439:13 (2016)Stimulating trust cooperation in edge services: An evolutionary tripartite game., , , , and . Eng. Appl. Artif. Intell., (2022)Secure Frequency Control of Hybrid Power System Under DoS Attacks via Lie Algebra., , , , and . IEEE Trans. Inf. Forensics Secur., (2022)