Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimizing Social Connections for Efficient Information Acquisition., , , and . GLOBECOM, page 1-6. IEEE, (2016)面向大数据分布式存储的动态负载均衡算法 (Dynamic Load Balance Algorithm for Big-data Distributed Storage)., , , , , and . 计算机科学, 44 (5): 178-183 (2017)Active Learning for Software Defect Prediction., , and . IEICE Trans. Inf. Syst., 95-D (6): 1680-1683 (2012)Disseminating authorized content via data analysis in opportunistic social networks., , , and . Big Data Min. Anal., 2 (1): 12-24 (2019)STFS: a novel file system for efficient small writes., , , , and . ACM SIGOPS Oper. Syst. Rev., 36 (4): 50-54 (2002)Location Privacy-Aware Task Bidding and Assignment for Mobile Crowd-Sensing., , , , , and . IEEE Access, (2019)Seed-free Graph De-anonymiztiation with Adversarial Learning., , , and . CIKM, page 745-754. ACM, (2020)Embedding virtual multicast trees in software-defined networks., , , , and . ICC, page 1-6. IEEE, (2017)Achieving Effective $k$ -Anonymity for Query Privacy in Location-Based Services., , , , , and . IEEE Access, (2017)Behavior of Social Network Users to Privacy Leakage: An Agent-Based Approach., , , and . MUE/FutureTech, volume 518 of Lecture Notes in Electrical Engineering, page 91-100. Springer, (2018)