Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy preserving shortest path routing with an application to navigation., , and . Pervasive Mob. Comput., (2014)Adaptive Secure Access to Remote Services in Mobile Environments., , and . IEEE Trans. Serv. Comput., 1 (1): 49-61 (2008)The Emergence of Vehicle Computing., , and . IEEE Internet Comput., 25 (3): 18-22 (2021)Joint Optimization of Security Strength and Resource Allocation for Computation Offloading in Vehicular Edge Computing., , , , , and . IEEE Trans. Wirel. Commun., 22 (12): 8751-8765 (December 2023)Blockchain-Enabled Efficient Dynamic Cross-Domain Deduplication in Edge Computing., , , , , , and . IEEE Internet Things J., 9 (17): 15639-15656 (2022)Safari: Function-level power analysis using automatic instrumentation., , , , and . ICEAC, page 1-6. IEEE, (2012)TRECON: A Framework for Enforcing Trusted ISP Peering., and . ICCCN, page 383-389. IEEE, (2006)Reinforcement Learning for Adaptive Video Compressive Sensing., , , and . CoRR, (2021)Secure and Reliable Transmission with Cooperative Relays in Two-Hop Wireless Networks., , , and . CoRR, (2012)A Case for Adaptive Resource Management in Alibaba Datacenter Using Neural Networks., , , , , , , , and . J. Comput. Sci. Technol., 35 (1): 209-220 (2020)