Author of the publication

Towards Private, Robust, and Verifiable Crowdsensing Systems via Public Blockchains.

, , , , and . IEEE Trans. Dependable Secur. Comput., 18 (4): 1893-1907 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data., , , , and . IEEE Trans. Image Processing, 25 (7): 3411-3425 (2016)Flood modeling and inundation risk evaluation using remote sensing imagery in coastal zone of China., , , , , , and . IGARSS, page 903-906. IEEE, (2012)DUMP: A Dummy-Point-Based Framework for Histogram Estimation in Shuffle Model., , , , , , and . CoRR, (2020)Zero-to-Stable Driver Identification: A Non-Intrusive and Scalable Driver Identification Scheme., , , , , , , and . IEEE Trans. Veh. Technol., 69 (1): 163-171 (2020)Vertical accuracy assessment of freely available digital elevation models over low-lying coastal plains., , , , , and . Int. J. Digit. Earth, 9 (3): 252-271 (2016)FedTracker: Furnishing Ownership Verification and Traceability for Federated Learning Model., , , , , , , and . CoRR, (2022)A Large-Scale Pretrained Deep Model for Phishing URL Detection., , , , , and . ICASSP, page 1-5. IEEE, (2023)Truth Inference on Sparse Crowdsourcing Data with Local Differential Privacy., , , , and . IEEE BigData, page 488-497. IEEE, (2018)PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones., , , , , , and . IEEE Internet Things J., 1 (1): 33-45 (2014)How to Securely Outsource Finding the Min-Cut of Undirected Edge-Weighted Graphs., , , , and . IEEE Trans. Inf. Forensics Secur., (2020)