Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Time-optimal and privacy preserving route planning for carpool policy., , , and . World Wide Web, 25 (3): 1151-1168 (2022)Differential Advising in Multiagent Reinforcement Learning., , , , and . IEEE Trans. Cybern., 52 (6): 5508-5521 (2022)Learning Games for Defending Advanced Persistent Threats in Cyber Systems., , , , and . IEEE Trans. Syst. Man Cybern. Syst., 53 (4): 2410-2422 (April 2023)Differential Advising in Multi-Agent Reinforcement Learning., , , , and . CoRR, (2020)A Blockchain-based Fast Authentication and Collaborative Video Data Forwarding Scheme for Vehicular Networks., , , , and . EUC, page 56-63. IEEE, (2021)Privacy and Utility Trade-Off for Textual Analysis via Calibrated Multivariate Perturbations., , , , and . NSS, volume 12570 of Lecture Notes in Computer Science, page 342-353. Springer, (2020)CloudController: A Writable and Heterogeneous-Adaptive Virtual Machine Introspection for Cloud Management., , , , and . TrustCom/BigDataSE/ICESS, page 177-184. IEEE Computer Society, (2017)Privacy Preserving in Location Data Release: A Differential Privacy Approach., , , , and . PRICAI, volume 8862 of Lecture Notes in Computer Science, page 183-195. Springer, (2014)Deferentially Private Tagging Recommendation Based on Topic Model., , , , and . PAKDD (1), volume 8443 of Lecture Notes in Computer Science, page 557-568. Springer, (2014)Proactive Deepfake Defence via Identity Watermarking., , , , , and . WACV, page 4591-4600. IEEE, (2023)