Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving QoS on high-speed vehicle by multipath transmission based on practical experiment., , , and . VNC, page 32-35. IEEE, (2015)Glaucus: Predicting Computing-Intensive Program's Performance for Cloud Customers., , , , and . ICIC (1), volume 7995 of Lecture Notes in Computer Science, page 285-294. Springer, (2013)HeapTherapy+: Efficient Handling of (Almost) All Heap Vulnerabilities Using Targeted Calling-Context Encoding., , , , , and . DSN, page 530-542. IEEE, (2019)CLPP: Context-aware location privacy protection for location-based social network., , , , and . ICC, page 1164-1169. IEEE, (2015)A novel stochastic-encryption-based P2P Digital Rights Management scheme., , , and . ICC, page 5541-5545. IEEE, (2015)Geometric Routing on Flat Names for ICN., , , , and . GLOBECOM, page 1-6. IEEE, (2015)Understanding the topologies of BitTorrent networks: A measurement view., , , , and . GLOBECOM, page 1994-1999. IEEE, (2012)Secure data access for wireless body sensor networks., , , and . WCNC, page 1-6. IEEE, (2016)PPBD: A piracy preventing system for BT DHT networks., , , and . INFOCOM, page 1806-1814. IEEE, (2013)A Strong Privacy-Preserving and Efficient Fingerprint Authentication via Clustering., , , , and . GLOBECOM, page 5889-5894. IEEE, (2023)