From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

IDS Intelligent Configuration Scheme Against Advanced Adaptive Attacks., , , , и . IEEE Trans. Netw. Sci. Eng., 8 (2): 995-1008 (2021)Two-Dimensional Behavior-Marker-Based Data Forwarding Incentive Scheme for Fog-Computing-Based SIoVs., , , и . IEEE Trans. Comput. Soc. Syst., 9 (5): 1406-1418 (2022)Dual-Mode Data Forwarding Scheme Based on Interest Tags for Fog Computing-Based SIoVs., , , и . IEEE Trans. Netw. Serv. Manag., 19 (3): 2780-2797 (2022)Secure Multi-Dimensional and Multi-Angle Electricity Data Aggregation Scheme for Fog Computing-Based Smart Metering System., , , , и . IEEE Trans. Green Commun. Netw., 6 (1): 313-328 (2022)Privacy-Preserving Electricity Data Classification Scheme Based on CNN Model With Fully Homomorphism., , , и . IEEE Trans. Sustain. Comput., 8 (4): 652-669 (октября 2023)A Framework for Identifying Diabetic Retinopathy Based on patch attention and lesion location., , , , , и . IJCNN, стр. 1-8. IEEE, (2023)Differential Privacy Preserving of Training Model in Wireless Big Data with Edge Computing., , , и . IEEE Trans. Big Data, 6 (2): 283-295 (2020)Conditional Identity Privacy-preserving Authentication Scheme Based on Cooperation of Multiple Fog Servers under Fog Computing-based IoVs., , , , и . ACM Trans. Internet Techn., 22 (4): 107:1-107:28 (ноября 2022)Secure Session Key Management Scheme for Meter-Reading System Based on LoRa Technology., , , , , и . IEEE Access, (2018)Effective charging identity authentication scheme based on fog computing in V2G networks., , , , , и . J. Inf. Secur. Appl., (2021)