Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward inference attacks for k-anonymity., , , and . Personal and Ubiquitous Computing, 18 (8): 1871-1880 (2014)Real-Time Data Incentives for IoT Searches., , , , , and . ICC, page 1-6. IEEE, (2018)Automatically verifying STRAC policy., , and . INFOCOM Workshops, page 141-142. IEEE, (2014)Analyzing asking/bidding price in dynamic game for cooperative authentication., , and . INFOCOM Workshops, page 165-166. IEEE, (2014)Utility-based cooperative decision in cooperative authentication., , , and . INFOCOM, page 1006-1014. IEEE, (2014)Enhancing the Trajectory Privacy with Laplace Mechanism., , and . TrustCom/BigDataSE/ISPA (1), page 1218-1223. IEEE, (2015)A General Distributed Object Locating Architecture in the Internet of Things., , , and . ICPADS, page 730-735. IEEE Computer Society, (2010)Dynamic Prototype Network Based on Sample Adaptation for Few-Shot Malware Detection., , , , and . IEEE Trans. Knowl. Data Eng., 35 (5): 4754-4766 (May 2023)Rinegan: A Scalable Image Processing Architecture for Large Scale Surveillance Applications., , , , , and . Frontiers Neurorobotics, (2021)Construction of Situation Assessment Indicator System Based on Latitude and Longitude Lines of Information Security., , , , , and . DSC, page 100-105. IEEE, (2019)