Author of the publication

Blockchain-based privacy protection scheme for electric energy metering data.

, , , , , and . CIAT, page 477-483. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic Task Scheduling in Cloud Computing Based on Greedy Strategy., , , and . ISCTCS, volume 320 of Communications in Computer and Information Science, page 156-162. Springer, (2012)Incorporate Spatial Information into pLSA for Scene Classification., , , and . ISCTCS, volume 320 of Communications in Computer and Information Science, page 170-177. Springer, (2012)Joint Cognitive Access and Power Control in Two-Tie Femtocell Networks., , , and . ISCTCS, volume 320 of Communications in Computer and Information Science, page 279-286. Springer, (2012)Machine Learning-Empowered Beam Management for mmWave-NOMA in Multi-UAVs Networks., , , , , and . IEEE Trans. Veh. Technol., 71 (8): 8487-8502 (2022)DSmT based scheduling algorithm in OFDMA systems., , , , and . ICT, page 1-6. IEEE, (2012)Data integrity research of power metering automation system., , , , and . ISCIT, page 666-670. IEEE, (2016)Short-delay clock recovery for CBR services in PTN., , and . IEEE Communications Letters, 13 (10): 791-793 (2009)Blockchain Storage Method Based on Erasure Code., , , , , and . DSC, page 98-105. IEEE, (2023)The Survey on the development of Secure Multi-Party Computing in the blockchain., , , , , and . DSC, page 1-7. IEEE, (2021)Robust base-station cooperation scheme with intelligent information processing., , , and . WCSP, page 1-5. IEEE, (2013)