Author of the publication

Personal Privacy Protection Framework Based on Hidden Technology for Smartphones.

, , , , and . IEEE Access, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Similarity Measure Based on Adjusted Euclidean Distance for Memory-based Collaborative Filtering., , , , and . J. Softw., 6 (6): 993-1000 (2011)A Service Level Agreement-based Web Services Performance., , , , and . ICCCN, page 1279-1284. IEEE, (2007)An adaptive prediction approach based on workload pattern discrimination in the cloud., , , , , and . J. Netw. Comput. Appl., (2017)Predicting of Job Failure in Compute Cloud Based on Online Extreme Learning Machine: A Comparative Study., , , , , and . IEEE Access, (2017)A Fractional-N Digital LC-PLL Using Coupled Frequency Doubler With Frequency-Tracking Loop for Wireline Applications., , , , , and . IEEE J. Solid State Circuits, 57 (6): 1736-1748 (2022)An End-Host-Importance-Aware Secure Service-Enabled Hybrid SDN Deployment., , , , and . IEEE Trans. Netw. Serv. Manag., 20 (2): 2056-2070 (June 2023)11.5 A 23.9-to-29.4GHz Digital LC-PLL with a Coupled Frequency Doubler for Wireline Applications in 10nm FinFET., , , , , and . ISSCC, page 188-190. IEEE, (2021)Integrating Information-Providing Web Services into the Data Integration System., , , and . ICWS, page 801-802. IEEE Computer Society, (2008)A Game Theory of Cloud Service Deployment., , , , and . SERVICES, page 436-443. IEEE Computer Society, (2013)Personal Privacy Protection Framework Based on Hidden Technology for Smartphones., , , , and . IEEE Access, (2017)