Author of the publication

Structured Sparsity Model Based Trajectory Tracking Using Private Location Data Release.

, , , , , and . IEEE Trans. Dependable Secur. Comput., 18 (6): 2983-2995 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deep and broad URL feature mining for android malware detection., , , , , , and . Inf. Sci., (2020)On the Limitation of Embedding Cryptographic Signature for Primary Transmitter Authentication., , , , and . IEEE Wirel. Commun. Lett., 1 (4): 324-327 (2012)GranDroid: Graph-Based Detection of Malicious Network Behaviors in Android Applications., , , , and . SecureComm (1), volume 254 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 264-280. Springer, (2018)High-bandwidth ultrasonic communication using graphene-based acoustic devices., , and . INFOCOM Workshops, page 1-2. IEEE, (2018)Lexical Mining of Malicious URLs for Classifying Android Malware., , , , , , and . SecureComm (1), volume 254 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 248-263. Springer, (2018)Achieving 5As in Cloud Centric Cognitive Cellular Networks., , , and . GLOBECOM, page 1-6. IEEE, (2016)Special issue on advances in security and privacy in IoT., , and . J. Netw. Comput. Appl., (2019)Privacy-Preserving Diffusion Model Using Homomorphic Encryption., and . CoRR, (2024)DynamicFL: Balancing Communication Dynamics and Client Manipulation for Federated Learning., , , and . SECON, page 312-320. IEEE, (2023)Rectifying Administrated ERC20 Tokens., , and . ICICS (1), volume 12918 of Lecture Notes in Computer Science, page 22-37. Springer, (2021)