Author of the publication

A Terminal Device Authentication Scheme Based on Blockchain Technology in WBAN.

, , , and . CSCloud/EdgeCom, page 411-416. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-Objective Optimal Trajectory Planning for Robotic Arms Using Deep Reinforcement Learning., , , and . Sensors, 23 (13): 5974 (July 2023)BTV-CMAB: A Bi-Directional Trust Verification-Based Combinatorial Multiarmed Bandit Scheme for Mobile Crowdsourcing., , , , , , , , and . IEEE Internet Things J., 11 (2): 1925-1938 (January 2024)A trajectory privacy-preserving scheme based on a dual-K mechanism for continuous location-based services., , , , and . Inf. Sci., (2020)Simulation Performance and Case Study of Extreme Events in Northwest China Using the BCC-CSM2 Model., , , and . Remote. Sens., 14 (19): 4922 (2022)Deep reinforcement learning for computation offloading in mobile edge computing environment., , , and . Comput. Commun., (2021)Keypoint-Graph-Driven Learning Framework for Object Pose Estimation., , , , and . CVPR, page 1065-1073. Computer Vision Foundation / IEEE, (2021)A High-Availability K-modes Clustering Method Based on Differential Privacy., , , , and . ICA3PP (2), volume 13156 of Lecture Notes in Computer Science, page 274-283. Springer, (2021)Deviation-Based Location Switching Protocol for Trajectory Privacy Protection., , and . ICA3PP (3), volume 9530 of Lecture Notes in Computer Science, page 417-428. Springer, (2015)Multi-branch Prediction Network for Multi-label Social Image Classification., , , and . CBD, page 201-206. IEEE, (2021)A novel saliency-based object segmentation method for seriously degenerated images., , and . ICIA, page 1172-1177. IEEE, (2015)