Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Regularizing Sparse and Imbalanced Communications for Voxel-based Brain Simulations on Supercomputers., , , , , , and . ICPP, page 81:1-81:11. ACM, (2022)A blockchain-based evidential and secure bulk-commodity supervisory system., , , , , , and . ICSS, page 1-6. IEEE, (2021)A Novel Data Placement Strategy for Data-Sharing Scientific Workflows in Heterogeneous Edge-Cloud Computing Environments., , , , , and . ICWS, page 498-507. IEEE, (2020)BIECS: A Blockchain-based Intelligent Edge Cooperation System for Latency-Sensitive Services., , , , , and . ICWS, page 367-372. IEEE, (2022)Intelligent Multi-Agent Collaboration Model for Smart Home IoT Security., , , , , and . ICIOT, page 65-71. IEEE Computer Society, (2018)Apply WS-Management to Manage Real Resources: MAPE Use Case Study., , and . ICWS, page 696-697. IEEE Computer Society, (2011)An Analysis and Comparison of the Development Status of Green Data Centers in China., , , and . SmartCloud, page 130-135. IEEE, (2023)InvMetrics: Measuring Privacy Risks for Split Model-Based Customer Behavior Analysis., , , , , , , and . IEEE Trans. Consumer Electron., 70 (1): 4168-4177 (February 2024)NIDD: an intelligent network intrusion detection model for nursing homes., , , , and . J. Cloud Comput., (2022)Universal adversarial backdoor attacks to fool vertical federated learning., , , and . Comput. Secur., (February 2024)