Author of the publication

Exploiting Trust-Based Social Networks for Distributed Protection of Sensitive Data.

, , , and . IEEE Trans. Inf. Forensics Secur., 6 (1): 39-52 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards an analytic model of epidemic spreading in heterogeneous systems., , and . QSHINE, page 24. ACM, (2007)Dynamic bacterial foraging optimization algorithm to optimal design of parallel manipulators., , and . ARSO, page 88-93. IEEE, (2014)A study on trajectory planning of hydraulic robotic excavator based on movement stability., , , and . URAI, page 582-586. IEEE, (2016)An experimental study on energy saving potential for cutterhead drive of shield Tunneling machine using variable-speed hydraulic system., , , and . AIM, page 818-823. IEEE, (2014)A new dynamic bacterial foraging optimization and its application on model reduction., , and . Int. J. Model. Simul. Sci. Comput., 6 (2): 1550018:1-1550018:25 (2015)A Note on the Right Spread Order Associated with Exponential Distributions.. J. Systems Science & Complexity, 19 (1): 108-113 (2006)Aging properties of the lifetime in simple additive degradation models., , and . J. Systems Science & Complexity, 24 (4): 753-760 (2011)Trajectory planning of a parallel manipulator based on kinematic transmission property., , , and . Intelligent Service Robotics, 8 (3): 129-139 (2015)A Stochastic Model on One-Unit Repairable Systems with Multiple Degenerative States., and . J. Systems Science & Complexity, 31 (3): 804-819 (2018)On active redundancy allocation for coherent systems - from the viewpoint of minimal cut decomposition., and . Oper. Res. Lett., 46 (2): 233-239 (2018)