Author of the publication

Secure Coded Matrix Multiplication against Cooperative Attack in Edge Computing.

, , , , , and . TrustCom, page 547-556. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of time structure in the industrial hybrid network., , , and . FSKD, page 2129-2132. IEEE, (2012)Using Spin-Hall MTJs to Build an Energy-Efficient In-memory Computation Platform., , , , , , , , and . ISQED, page 52-57. IEEE, (2019)On the design of a general multiple-namespace system for future networks., , , , , and . INFOCOM Workshops, page 15-16. IEEE, (2015)Dual-homing multicast protection., , , and . GLOBECOM, page 1123-1127. IEEE, (2004)Performance Modeling and Analysis of Multi-Path Routing in Integrated Fiber-Wireless Networks., , , and . INFOCOM, page 311-315. IEEE, (2010)3-D Short-Range Imaging With Irregular MIMO Arrays Using NUFFT-Based Range Migration Algorithm., , and . IEEE Trans. Geosci. Remote. Sens., 58 (7): 4730-4742 (2020)TA-MAC: A Traffic-Aware TDMA MAC Protocol for Safety Message Dissemination in MEC-assisted VANETs., , , , , , and . ICCCN, page 1-9. IEEE, (2020)Smart Sensing for Container Trucks., , , , , and . BigCom, page 1-7. IEEE, (2020)A Survey on Platoon-Based Vehicular Cyber-Physical Systems., , , , and . IEEE Commun. Surv. Tutorials, 18 (1): 263-284 (2016)Exploring the Feasibility of Using 3D XPoint as an In-Memory Computing Accelerator., , , , , , , and . CoRR, (2021)