Author of the publication

Evolutionary game analysis of violation regulation in the electricity market based on blockchain technology.

, , , and . J. Intell. Fuzzy Syst., 46 (4): 11219-11233 (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BigDataBench: A Dwarf-based Big Data and AI Benchmark Suite., , , , , , , , , and 2 other author(s). CoRR, (2018)SMART: Design and Evaluation of a Collaborative Museum Visiting Application., , , , , , , and . CDVE, volume 9320 of Lecture Notes in Computer Science, page 57-64. Springer, (2015)A Novel Framework for Outsourcing and Sharing Searchable Encrypted Data on Hybrid Cloud., , , and . INCoS, page 1-7. IEEE, (2012)Filters navigation and positioning based on mining vehicle motion model., , , , , and . CACRE, page 31-36. IEEE, (2020)Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption., , , , , and . ESORICS, volume 8134 of Lecture Notes in Computer Science, page 592-609. Springer, (2013)Efficient Network Path Verification for Policy-routedQueries., , and . CODASPY, page 319-328. ACM, (2016)Information Leakage in Encrypted Deduplication via Frequency Analysis: Attacks and Defenses., , , , and . ACM Trans. Storage, 16 (1): 4:1-4:30 (2020)Operator splitting based structure-preserving numerical schemes for the mass-conserving convective Allen-Cahn equation., , , and . J. Comput. Phys., (2023)Spatial Non-Maximum Suppression for Object Detection using Correlation and Dynamic Thresholds., , , , and . ISOCC, page 264-265. IEEE, (2021)Balancing storage efficiency and data confidentiality with tunable encrypted deduplication., , , , and . EuroSys, page 22:1-22:15. ACM, (2020)