Author of the publication

Discovering Real-Time Reachable Area Using Trajectory Connections.

, , , , , , , and . DASFAA (2), volume 12113 of Lecture Notes in Computer Science, page 36-53. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SecRouting: Secure Routing for Network Functions Virtualization (NFV) Technology., and . IEEE Trans. Circuits Syst. II Express Briefs, 69 (3): 1727-1731 (2022)RumorDecay: Rumor Dissemination Interruption for Target Recipients in Social Networks., , , and . IEEE Trans. Syst. Man Cybern. Syst., 52 (10): 6383-6395 (2022)Reliability evaluation for NFV deployment of future mobile broadband networks., , , , and . IEEE Wirel. Commun., 23 (3): 90-96 (2016)EDF: Enhanced Deep Fingerprinting attacks on Websites., and . NaNA, page 293-299. IEEE, (2023)Enhancing Path Reliability against Sybil Attack by Improved Multi-Path-Trees in SDN., and . GLOBECOM, page 1-6. IEEE, (2020)Discovering Real-Time Reachable Area Using Trajectory Connections., , , , , , , and . DASFAA (2), volume 12113 of Lecture Notes in Computer Science, page 36-53. Springer, (2020)Walk2Privacy: Limiting target link privacy disclosure against the adversarial link prediction., , and . IEEE BigData, page 1381-1388. IEEE, (2019)Centrality Based Privacy Preserving for Weighted Social Networks., , , , and . CIS, page 574-577. IEEE Computer Society, (2017)Multi-hop Based Centrality of a Path in Complex Network., , , , and . CIS, page 292-296. IEEE Computer Society, (2017)Doing in One Go: Delivery Time Inference Based on Couriers' Trajectories., , , , , , , , , and . KDD, page 2813-2821. ACM, (2020)