Author of the publication

Guest Editorial Special Issue on Cybertwin-Driven 6G: Architectures, Methods, and Applications.

, , , , , and . IEEE Internet Things J., 8 (22): 16191-16194 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Guest Editorial Special Issue on Cybertwin-Driven 6G: Architectures, Methods, and Applications., , , , , and . IEEE Internet Things J., 8 (22): 16191-16194 (2021)Blockchain-Based Credential Management for Anonymous Authentication in SAGVN., , , , and . IEEE J. Sel. Areas Commun., 40 (10): 3104-3116 (2022)Privacy-Enhancing Fog Computing and Its Applications, , and . Springer Briefs in Electrical and Computer Engineering Springer, (2018)AT-CBDC: Achieving Anonymity and Traceability in Central Bank Digital Currency., , and . ICC, page 4402-4407. IEEE, (2022)Achieving Adaptive Linkability for Cellular V2X Group Communications in 5G., , , and . GLOBECOM, page 1-7. IEEE, (2018)Personalized Privacy-Preserving Federated Learning: Optimized Trade-off Between Utility and Privacy., , , , , and . GLOBECOM, page 4872-4877. IEEE, (2022)Balancing Security and Efficiency for Smart Metering Against Misbehaving Collectors., , , and . IEEE Trans. Smart Grid, 10 (2): 1225-1236 (2019)Blockchain-Based Smart Advertising Network With Privacy-Preserving Accountability., , , , and . IEEE Trans. Netw. Sci. Eng., 8 (3): 2118-2130 (2021)Security and Privacy for Mobile Edge Caching: Challenges and Solutions., , and . IEEE Wirel. Commun., 28 (3): 77-83 (2021)Crafting Text Adversarial Examples to Attack the Deep-Learning-based Malicious URL Detection., , , , , and . ICC, page 3118-3123. IEEE, (2022)