Author of the publication

A method of chained recommendation for charging piles in internet of vehicles.

, , , , , and . Computing, 103 (2): 231-249 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Easy Peasy: A New Handy Method for Pairing Multiple COTS IoT Devices., , , , and . IEEE Trans. Dependable Secur. Comput., 20 (4): 3483-3494 (July 2023)Resilient User-Side Android Application Repackaging and Tampering Detection Using Cryptographically Obfuscated Logic Bombs., , , , , , and . IEEE Trans. Dependable Secur. Comput., 18 (6): 2582-2600 (2021)A Bottleneck-Aware Multipath Scheduling Mechanism for Social Networks., , , , , , and . ICC, page 1-6. IEEE, (2021)Privacy-Preserving Data Sharing Scheme with FL via MPC in Financial Permissioned Blockchain., , , , and . ICC, page 1-6. IEEE, (2021)A Privacy-Preserving Medical Data Sharing Scheme Based on Consortium Blockchain., , , , and . GLOBECOM, page 1-6. IEEE, (2020)Using Cloud Computing Based Crowdsourcing for Security and Privacy Settings of Android Users., , , , , , and . GLOBECOM, page 522-527. IEEE, (2022)A Strong Privacy-Preserving and Efficient Fingerprint Authentication via Clustering., , , , and . GLOBECOM, page 5889-5894. IEEE, (2023)Improving QoS on high-speed vehicle by multipath transmission based on practical experiment., , , and . VNC, page 32-35. IEEE, (2015)Multi-layer security scheme for implantable medical devices., , , , , , and . Neural Comput. Appl., 32 (9): 4347-4360 (2020)Adaptive cell relay routing protocol for mobile ad hoc networks., and . IEEE Trans. Veh. Technol., 55 (1): 278-285 (2006)