Author of the publication

martFL: Enabling Utility-Driven Data Marketplace with a Robust and Verifiable Federated Learning Architecture.

, , , and . CCS, page 1496-1510. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

K-connectivity of cognitive radio networks., , , and . ICC, page 83-87. IEEE, (2012)Transmission delay in large scale ad hoc cognitive radio networks., , , and . MobiHoc, page 185-194. ACM, (2012)Efficient Clustering on Encrypted Data., , , , , and . ACNS (1), volume 14583 of Lecture Notes in Computer Science, page 213-236. Springer, (2024)DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps., , , , , , , , , and 1 other author(s). CCS, page 2421-2436. ACM, (2019)SmartRetro: Blockchain-Based Incentives for Distributed IoT Retrospective Detection., , , , and . MASS, page 308-316. IEEE Computer Society, (2018)Managing Recurrent Virtual Network Updates in Multi-Tenant Datacenters: A System Perspective., , and . CoRR, (2019)Dynamic Network Security Function Enforcement via Joint Flow and Function Scheduling., , , , , , , and . IEEE Trans. Inf. Forensics Secur., (2022)An Automated Multi-Tab Website Fingerprinting Attack., , , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (6): 3656-3670 (2022)Learning with Semantics: Towards a Semantics-Aware Routing Anomaly Detection System., , , , , , , , and . CoRR, (2024)Threshold-Based Routing-Topology Co-Design for Optical Data Center., , , , , , , , and . IEEE/ACM Trans. Netw., 31 (6): 2870-2885 (December 2023)