Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Robust Deep-Neural-Network-Based Compressed Model for Mobile Device Assisted by Edge Server., and . IEEE Access, (2019)Image Content Location Privacy Preserving in Social Network Travel Image Sharing., , , and . ICAIS (2), volume 12240 of Lecture Notes in Computer Science, page 617-628. Springer, (2020)Federated CF: Privacy-Preserving Collaborative Filtering Cross Multiple Datasets., , , and . ICC, page 1-6. IEEE, (2020)Race Classification Based Iris Image Segmentation., , , and . ICSM, volume 12015 of Lecture Notes in Computer Science, page 383-393. Springer, (2019)Privacy Preserving Facial Recognition Against Model Inversion Attacks., , , , , and . GLOBECOM, page 1-6. IEEE, (2020)Anonymous Communication in Wireless Mesh Network., , , and . CIS (2), page 416-420. IEEE Computer Society, (2009)978-0-7695-3931-7.An Automated Black-box Testing Approach for WSN Security Protocols., , , , and . CIS, page 693-697. IEEE Computer Society, (2011)FSVM: Federated Support Vector Machines for Smart City., , , , and . TRIDENTCOM, volume 489 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 149-167. Springer, (2022)An Efficient Query Scheme for Hybrid Storage Blockchains Based on Merkle Semantic Trie., , , , and . SRDS, page 51-60. IEEE, (2020)Cooperative Computation Offloading and Resource Allocation for Blockchain-Enabled Mobile-Edge Computing: A Deep Reinforcement Learning Approach., , , , , and . IEEE Internet Things J., 7 (7): 6214-6228 (2020)