Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Fragile Watermarking Algorithm Based on Audio Content and Its Moving Average., , and . ICAIS (2), volume 12240 of Lecture Notes in Computer Science, page 328-340. Springer, (2020)rFedFW: Secure and trustable aggregation scheme for Byzantine-robust federated learning in Internet of Things., , , , , and . Inf. Sci., (January 2024)BFAC-CS: A Blockchain-Based Fine-Grained Access Control Scheme for Complex Scenarios., , , , , , and . ICAIS (3), volume 13340 of Lecture Notes in Computer Science, page 133-143. Springer, (2022)A Privacy Preserving Algorithm Based on R-constrained Dummy Trajectory in Mobile Social Network., , , , and . IIKI, volume 129 of Procedia Computer Science, page 420-425. Elsevier, (2017)A Location Privacy Preserving Scheme Based on Repartitioning Anonymous Region in Mobile Social Network., , , , and . IIKI, volume 129 of Procedia Computer Science, page 368-371. Elsevier, (2017)A Heuristic Algorithm for Task Scheduling Based on Mean Load., , , and . SKG, page 5. IEEE Computer Society, (2005)Task Scheduling in Multi-Cloud Environments for Spark Workflow under Performance Uncertainty., , , , , and . CSCWD, page 2752-2757. IEEE, (2024)Unexpected Data Dependency Creation and Chaining: A New Attack to SDN., , , , , and . SP, page 1512-1526. IEEE, (2020)Robust Audio Watermarking Algorithm Based on Moving Average and DCT., , and . ICAIS (3), volume 11634 of Lecture Notes in Computer Science, page 419-429. Springer, (2019)Priced Timed Petri Nets Based Resource Allocation Strategy for Fog Computing., , and . IIKI, page 39-44. IEEE Computer Society, (2016)