Author of the publication

Privacy-Preserving Verification and Root-Cause Tracing Towards UAV Social Networks.

, , , , , and . ICC, page 1-6. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Self-Supervised Learning Model for Unknown Internet Traffic Identification Based on Surge Period., , and . Future Internet, 14 (10): 289 (2022)UAV-Assisted Privacy-Preserving Online Computation Offloading for Internet of Things., , , and . Remote. Sens., 13 (23): 4853 (2021)PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks., , , , and . NaNA, page 5-10. IEEE Computer Society, (2017)GlareShell: Graph learning-based PHP webshell detection for web server of industrial internet., , , , , , and . Comput. Networks, (2024)Computation offloading over multi-UAV MEC network: A distributed deep reinforcement learning approach., , , , , and . Comput. Networks, (2021)Cyberlogic Paves the Way From Cyber Philosophy to Cyber Science., , , , and . IEEE Internet Things J., 4 (3): 783-790 (2017)Personalized Privacy-Aware Task Offloading for Edge-Cloud-Assisted Industrial Internet of Things in Automated Manufacturing., , , , , and . IEEE Trans. Ind. Informatics, 18 (11): 7935-7945 (2022)Certificateless designated verifier proxy signature scheme for unmanned aerial vehicle networks., , , and . Sci. China Inf. Sci., (2021)Deep Low Light Image Enhancement Via Multi-Scale Recursive Feature Enhancement and Curve Adjustment., , and . ICASSP, page 1-5. IEEE, (2023)Asymmetric Group Key Agreement with Traitor Traceability., , and . CIS, page 347-351. IEEE Computer Society, (2010)