Author of the publication

An incentive mechanism with privacy protection in mobile crowdsourcing systems.

, , , , , and . Comput. Networks, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Technique Report: Scheduling Flows with Multiple Service Frequency Constraints., , , and . CoRR, (2016)Privacy-preserved distinct content collection in human-assisted ubiquitous computing systems., , , , and . Inf. Sci., (2019)Latent-Data Privacy Preserving With Customized Data Utility for Social Network Data., , and . IEEE Trans. Veh. Technol., 67 (1): 665-673 (2018)Functional dependency restricted insertion propagation., , , and . Theor. Comput. Sci., (2020)Differentially Private Recommendation System Based on Community Detection in Social Network Applications., , , , and . Secur. Commun. Networks, (2018)Microarray Missing Value Imputation by Iterated Local Least Squares., , and . APBC, page 159-168. Imperial College Press, London, (2006)ComPhy: prokaryotic composite distance phylogenies inferred from whole-genome gene sets., , , , and . BMC Bioinform., (2009)A Model-Free Greedy Gene Selection for Microarray Sample Class Prediction., , , , , and . CIBCB, page 1-8. IEEE, (2006)ASTL: Accumulative STL With a Novel Robustness Metric for IoT Service Monitoring., , , , and . IEEE Trans. Mob. Comput., 22 (10): 5751-5768 (October 2023)Structure-Free Broadcast Scheduling for Duty-Cycled Multihop Wireless Sensor Networks., , , , and . IEEE Trans. Mob. Comput., 21 (12): 4624-4641 (2022)