Author of the publication

Clock Auction Inspired Privacy Preserving Emergency Demand Response in Colocation Data Centers.

, , , , , , and . IEEE Trans. Dependable Secur. Comput., 17 (4): 691-702 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Proximity-Based Concurrent Access Strategy to Improve Throughput in VANETs., , , , , and . IJDSN, (2013)Anonymous Communication in Wireless Mesh Network., , , and . CIS (2), page 416-420. IEEE Computer Society, (2009)978-0-7695-3931-7.An Automated Black-box Testing Approach for WSN Security Protocols., , , , and . CIS, page 693-697. IEEE Computer Society, (2011)FSVM: Federated Support Vector Machines for Smart City., , , , and . TRIDENTCOM, volume 489 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 149-167. Springer, (2022)QuickAuth: Two-Factor Quick Authentication Based on Ambient Sound., , and . GLOBECOM, page 1-6. IEEE, (2016)Federated CF: Privacy-Preserving Collaborative Filtering Cross Multiple Datasets., , , and . ICC, page 1-6. IEEE, (2020)Image Content Location Privacy Preserving in Social Network Travel Image Sharing., , , and . ICAIS (2), volume 12240 of Lecture Notes in Computer Science, page 617-628. Springer, (2020)A Robust Deep-Neural-Network-Based Compressed Model for Mobile Device Assisted by Edge Server., and . IEEE Access, (2019)Cooperative Computation Offloading and Resource Allocation for Blockchain-Enabled Mobile-Edge Computing: A Deep Reinforcement Learning Approach., , , , , and . IEEE Internet Things J., 7 (7): 6214-6228 (2020)A Cache Allocation Scheme in 5G-Enabled Inhomogeneous ICVs., , , , , , and . VTC Fall, page 1-6. IEEE, (2020)