Author of the publication

Secure Coded Matrix Multiplication against Cooperative Attack in Edge Computing.

, , , , , and . TrustCom, page 547-556. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Learning Framework for Sampling-Based Motion Planning in Autonomous Driving., , , , , and . AAAI, page 1202-1209. AAAI Press, (2020)A Reinforcement Learning Based Two-Stage Model for Emotion Cause Pair Extraction., , , , , and . IEEE Trans. Affect. Comput., 14 (3): 1779-1790 (July 2023)Exploring the Feasibility of Using 3D XPoint as an In-Memory Computing Accelerator., , , , , , , and . CoRR, (2021)Service Composition in Service-Oriented Wireless Sensor Networks with Persistent Queries., , , , and . CCNC, page 1-5. IEEE, (2009)Using Spin-Hall MTJs to Build an Energy-Efficient In-memory Computation Platform., , , , , , , , and . ISQED, page 52-57. IEEE, (2019)Dual-homing multicast protection., , , and . GLOBECOM, page 1123-1127. IEEE, (2004)Performance Modeling and Analysis of Multi-Path Routing in Integrated Fiber-Wireless Networks., , , and . INFOCOM, page 311-315. IEEE, (2010)3-D Short-Range Imaging With Irregular MIMO Arrays Using NUFFT-Based Range Migration Algorithm., , and . IEEE Trans. Geosci. Remote. Sens., 58 (7): 4730-4742 (2020)TA-MAC: A Traffic-Aware TDMA MAC Protocol for Safety Message Dissemination in MEC-assisted VANETs., , , , , , and . ICCCN, page 1-9. IEEE, (2020)Contention-tolerant crossbar packet switches., , , , and . Int. J. Commun. Syst., 24 (2): 168-184 (2011)