Author of the publication

Accountable and Verifiable Secure Aggregation for Federated Learning in IoT Networks.

, , , , , and . IEEE Netw., 36 (5): 173-179 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Nordhaus-Gaddum type inequality for the integer k-matching number of a graph., and . Discret. Appl. Math., (December 2023)How anthropomorphism affects trust in intelligent personal assistants., and . Ind. Manag. Data Syst., 121 (12): 2722-2737 (2021)The nullity of a graph with fractional matching number., and . Discret. Math., 345 (8): 112919 (2022)Why do users resist service organization's brand mobile apps? The force of barriers versus cross-channel synergy., , , and . Int. J. Inf. Manag., (2019)Concurrent Rate-Adaptive Reading With Passive RFIDs., , , , , , , , , and . IEEE Internet Things J., 10 (1): 499-511 (2023)A penalty function semi-continuous thresholding methods for constraints of hashing problems., , and . J. Vis. Commun. Image Represent., (2022)Three-dimensional modeling of the human hand with motion constraints., , and . Image Vis. Comput., 17 (2): 149-156 (1999)Location-Aware Channel Estimation Enhanced TDD Based Massive MIMO., , , and . IEEE Access, (2016)Throughput maximization for cooperative 60 GHz wireless personal area networks., , , , and . Comput. Networks, (2016)Route optimization in optical burst switched networks considering the streamline effect., , and . Comput. Networks, 52 (10): 2033-2044 (2008)