Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure High-Order Lanczos-Based Orthogonal Tensor SVD for Big Data Reduction in Cloud Environment., , , , and . IEEE Trans. Big Data, 5 (3): 355-367 (2019)An evaluation of user importance when integrating social networks and mobile cloud computing., , , , and . GLOBECOM, page 2935-2940. IEEE, (2014)Mend Barrier Gaps via Sensor Rotation for a Line-Based Deployed Directional Sensor Network., , , , and . HPCC/EUC, page 2074-2079. IEEE, (2013)Rich Mobile Applications: Genesis, taxonomy, and open issues., , , , and . J. Netw. Comput. Appl., (2014)A novel parallel deblocking filtering strategy for HEVC/H.265 based on GPU., , , , , , and . Concurr. Comput. Pract. Exp., 28 (16): 4264-4276 (2016)Tensor-Based Multiple Clustering Approaches for Cyber-Physical-Social Applications., , and . IEEE Trans. Emerg. Top. Comput., 8 (1): 69-81 (2020)Toward Offering More Useful Data Reliably to Mobile Cloud From Wireless Sensor Network., , , , and . IEEE Trans. Emerg. Top. Comput., 3 (1): 84-94 (2015)Special Section on Privacy Computing: Principles and Applications., and . Inf. Sci., (2020)ADVS: a reputation-based model on filtering SPIT over P2P-VoIP networks., , , and . J. Supercomput., 64 (3): 744-761 (2013)LSTM and Edge Computing for Big Data Feature Recognition of Industrial Electrical Equipment., , , and . IEEE Trans. Ind. Informatics, 15 (4): 2469-2477 (2019)