Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhanced and Explainable Deep Learning-Based Intrusion Detection in IoT Networks., , , , and . MILCOM, page 649-654. IEEE, (2023)P2AE: Preserving Privacy, Accuracy, and Efficiency in Location-Dependent Mobile Crowdsensing., , , and . IEEE Trans. Mob. Comput., 22 (4): 2323-2339 (April 2023)QoE-driven peer discovery for D2D video communication., , , , and . ICCE-TW, page 1-2. IEEE, (2016)Preserving Location Privacy and Accurate Task Allocation in Edge-assisted Mobile Crowdsensing., , , and . WCNC, page 704-709. IEEE, (2022)Poster: Machine Learning Based False Position Detection Using Data-to-Image Transformation., , , and . MOST, page 286-287. IEEE, (2024)Anonymous and Efficient Authentication Scheme for Privacy-Preserving Distributed Learning., , , and . IEEE Trans. Inf. Forensics Secur., (2022)An Optimization Framework for Privacy-preserving Access Control in Cloud-Fog Computing Systems., , , and . VTC Fall, page 1-5. IEEE, (2020)Cooperative Task Allocation in Edge Computing Assisted Vehicular Crowdsensing., , , and . GLOBECOM, page 1-6. IEEE, (2021)Efficient and Privacy-preserving Distributed Learning in Cloud-Edge Computing Systems., , , and . WiseML@WiSec, page 25-30. ACM, (2021)Enhancing Malware Classification via Self-Similarity Techniques., , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)