Author of the publication

Privacy-Preserved and Best-Effort Provisions of Cyber-I Information to Personalized Services.

, and . DSDIS, page 218-225. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Socially-Aware Networking: A Survey, , , , and . (2013)cite arxiv:1312.6552Comment: accepted. IEEE Systems Journal, 2013.Analysis of Temporal Features in Data Streams from Multiple Wearable Devices., , and . CYBCONF, page 1-6. IEEE, (2017)Time Critical Content Delivery Using Predictable Patterns in Mobile Social Networks., , and . CSE (4), page 1066-1073. IEEE Computer Society, (2009)Privacy-Preserved and Best-Effort Provisions of Cyber-I Information to Personalized Services., and . DSDIS, page 218-225. IEEE Computer Society, (2015)Threshold choices of Huber regularization using global- and local-edge-detecting operators for x-ray computed tomographic reconstruction., , , , , , , and . EMBC, page 2352-2355. IEEE, (2013)The Design and Implementation of a Distributed Web Document Database., , and . ICPP Workshops, page 562-569. IEEE Computer Society, (1999)Password Recovery for RAR Files Using CUDA., , and . DASC, page 486-490. IEEE Computer Society, (2009)An Incremental Collaborative Filtering Based Recommendation Framework for Personalized Websites., , , , and . DASC/PiCom/DataCom/CyberSciTech, page 181-186. IEEE Computer Society, (2018)Correlation Analyses Between Personality Traits and Personal Behaviors Under Specific Emotion States Using Physiological Data from Wearable Devices., , , , , and . DASC/PiCom/DataCom/CyberSciTech, page 46-53. IEEE Computer Society, (2018)Towards Integrative Personal Character Modeling Using Multi-strategy Fusion Across Scenarios and Periods., , and . DASC/PiCom/DataCom/CyberSciTech, page 185-192. IEEE, (2019)