Author of the publication

Defending sybil attacks in mobile social networks.

, , and . INFOCOM Workshops, page 163-164. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing the Trajectory Privacy with Laplace Mechanism., , and . TrustCom/BigDataSE/ISPA (1), page 1218-1223. IEEE, (2015)Toward inference attacks for k-anonymity., , , and . Personal and Ubiquitous Computing, 18 (8): 1871-1880 (2014)Dynamic Prototype Network Based on Sample Adaptation for Few-Shot Malware Detection., , , , and . IEEE Trans. Knowl. Data Eng., 35 (5): 4754-4766 (May 2023)Real-Time Data Incentives for IoT Searches., , , , , and . ICC, page 1-6. IEEE, (2018)Utility-based cooperative decision in cooperative authentication., , , and . INFOCOM, page 1006-1014. IEEE, (2014)Automatically verifying STRAC policy., , and . INFOCOM Workshops, page 141-142. IEEE, (2014)Analyzing asking/bidding price in dynamic game for cooperative authentication., , and . INFOCOM Workshops, page 165-166. IEEE, (2014)Rinegan: A Scalable Image Processing Architecture for Large Scale Surveillance Applications., , , , , and . Frontiers Neurorobotics, (2021)A General Distributed Object Locating Architecture in the Internet of Things., , , and . ICPADS, page 730-735. IEEE Computer Society, (2010)Assessing the Disclosure of User Profile in Mobile-Aware Services., , and . Inscrypt, volume 9589 of Lecture Notes in Computer Science, page 451-467. Springer, (2015)