Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Proximity-Based Concurrent Access Strategy to Improve Throughput in VANETs., , , , , and . IJDSN, (2013)Privacy-Preserving Verification and Root-Cause Tracing Towards UAV Social Networks., , , , , and . ICC, page 1-6. IEEE, (2019)QuickAuth: Two-Factor Quick Authentication Based on Ambient Sound., , and . GLOBECOM, page 1-6. IEEE, (2016)A Robust Deep-Neural-Network-Based Compressed Model for Mobile Device Assisted by Edge Server., and . IEEE Access, (2019)Image Content Location Privacy Preserving in Social Network Travel Image Sharing., , , and . ICAIS (2), volume 12240 of Lecture Notes in Computer Science, page 617-628. Springer, (2020)Federated CF: Privacy-Preserving Collaborative Filtering Cross Multiple Datasets., , , and . ICC, page 1-6. IEEE, (2020)Cooperative Computation Offloading and Resource Allocation for Blockchain-Enabled Mobile-Edge Computing: A Deep Reinforcement Learning Approach., , , , , and . IEEE Internet Things J., 7 (7): 6214-6228 (2020)Task Scheduling and Resource Management in MEC-Enabled Computing Networks., , , , , and . MONAMI, volume 418 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 127-137. Springer, (2021)A Cache Allocation Scheme in 5G-Enabled Inhomogeneous ICVs., , , , , , and . VTC Fall, page 1-6. IEEE, (2020)Privacy Preserving Facial Recognition Against Model Inversion Attacks., , , , , and . GLOBECOM, page 1-6. IEEE, (2020)