Author of the publication

Spatiotemporal-Aware Privacy-Preserving Task Matching in Mobile Crowdsensing.

, , , , , and . IEEE Internet Things J., 11 (2): 2394-2406 (January 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Simulation Performance and Case Study of Extreme Events in Northwest China Using the BCC-CSM2 Model., , , and . Remote. Sens., 14 (19): 4922 (2022)A trajectory privacy-preserving scheme based on a dual-K mechanism for continuous location-based services., , , , and . Inf. Sci., (2020)BTV-CMAB: A Bi-Directional Trust Verification-Based Combinatorial Multiarmed Bandit Scheme for Mobile Crowdsourcing., , , , , , , , and . IEEE Internet Things J., 11 (2): 1925-1938 (January 2024)Deep reinforcement learning for computation offloading in mobile edge computing environment., , , and . Comput. Commun., (2021)Multi-branch Prediction Network for Multi-label Social Image Classification., , , and . CBD, page 201-206. IEEE, (2021)A novel saliency-based object segmentation method for seriously degenerated images., , and . ICIA, page 1172-1177. IEEE, (2015)Multi-Objective Optimal Trajectory Planning for Robotic Arms Using Deep Reinforcement Learning., , , and . Sensors, 23 (13): 5974 (July 2023)Keypoint-Graph-Driven Learning Framework for Object Pose Estimation., , , , and . CVPR, page 1065-1073. Computer Vision Foundation / IEEE, (2021)A High-Availability K-modes Clustering Method Based on Differential Privacy., , , , and . ICA3PP (2), volume 13156 of Lecture Notes in Computer Science, page 274-283. Springer, (2021)Deviation-Based Location Switching Protocol for Trajectory Privacy Protection., , and . ICA3PP (3), volume 9530 of Lecture Notes in Computer Science, page 417-428. Springer, (2015)