Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Software Defined Security Scheme Based on SDN Environment., and . CyberC, page 504-512. IEEE, (2017)Modelling and Analysis of Regional Service Behavior Properties of Mobile Internet Applications., , and . IEEE Access, (2017)Fair Exchange Mechanism for P2P Systems., , and . GCC, page 235-239. IEEE Computer Society, (2010)RPSBPT: A Route Planning Scheme with Best Profit for Taxi., and . MSN, page 121-126. IEEE, (2018)Security of Multi-antenna Laptop Wirelessly Access to Internet of Things Networks., and . CyberC, IEEE, (2018)Privacy-aware offloading for training tasks of generative adversarial network in edge computing., , , , , and . Inf. Sci., (2020)Intelligent Computation Offloading and Resource Allocation in IIoT With End-Edge-Cloud Computing Using NSGA-III., , , , , and . IEEE Trans. Netw. Sci. Eng., 10 (5): 3032-3046 (September 2023)Privacy-preserving design of graph neural networks with applications to vertical federated learning., , , , , , , , and . CoRR, (2023)Attribute-Based Encryption With Blockchain Protection Scheme for Electronic Health Records., , and . IEEE Trans. Netw. Serv. Manag., 19 (4): 3884-3895 (December 2022)LGAN-DP: A novel differential private publication mechanism of trajectory data., , and . Future Gener. Comput. Syst., (April 2023)