Author of the publication

Differential Privacy Preserving of Training Model in Wireless Big Data with Edge Computing.

, , , and . IEEE Trans. Big Data, 6 (2): 283-295 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Strategic Honeypot Game Model for Distributed Denial of Service Attacks in the Smart Grid., , , and . IEEE Trans. Smart Grid, 8 (5): 2474-2482 (2017)From Network Traces to System Responses: Opaquely Emulating Software Services., , , , and . CoRR, (2015)Spacechain: A Three-Dimensional Blockchain Architecture for IoT Security., , , , , , and . IEEE Wirel. Commun., 27 (3): 38-45 (2020)Attack Detection and Distributed Forensics in Machine-to-Machine Networks., , , , and . IEEE Netw., 30 (6): 49-55 (2016)Isolation and handling of sensor faults in nonlinear systems., and . Autom., 50 (4): 1066-1074 (2014)QoE-Based Task Offloading With Deep Reinforcement Learning in Edge-Enabled Internet of Vehicles., , , , and . IEEE Trans. Intell. Transp. Syst., 22 (4): 2252-2261 (2021)Fault detection and isolation and safe-parking of networked systems., , and . ACC, page 3146-3151. IEEE, (2011)Actuator and sensor fault isolation of nonlinear systems., , and . ACC, page 3567-3572. IEEE, (2013)Scalar Quantization as Sparse Least Square Optimization., , , , , , and . IEEE Trans. Pattern Anal. Mach. Intell., 43 (5): 1678-1690 (2021)Optimal active detection in machine-to-machine mobile networks: A repeated game approach., , , , and . PIMRC, page 1-6. IEEE, (2016)