Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blockchain-Aware Rollbackable Data Access Control for IoT-Enabled Digital Twin., , , and . IEEE J. Sel. Areas Commun., 41 (11): 3517-3532 (November 2023)Bio-inspired Mechanism and Model Exploration of Software Aging., , , and . CoRR, (2014)A Comprehensive Trust Model Based on Reputation and Fuzzy Theory., , , , , and . J. Comput., 9 (11): 2666-2676 (2014)Study on Influencing Factors of Microblog User's Malicious Disinhibition Behavior., , , and . IMMS, page 84-95. ACM, (2023)An Offset Algorithm for Conflict Resolution in Context-Aware Computing., , , , and . UIC, volume 4611 of Lecture Notes in Computer Science, page 878-887. Springer, (2007)Semantic-Informed Driver Fuzzing Without Both the Hardware Devices and the Emulators., , , and . NDSS, The Internet Society, (2022)A robust inference algorithm for crowd sourced categorization., , , , , and . ISKE, page 1-6. IEEE, (2017)Energy-Aware Scheduling Tasks on Chip Multiprocessor., , , and . ICNC (4), page 319-323. IEEE Computer Society, (2007)Maelstrom: Receiver-Location Preserving in Wireless Sensor Networks., , , , and . WASA, volume 6843 of Lecture Notes in Computer Science, page 190-201. Springer, (2011)Research on context-aware architecture for personal information privacy protection., , , , and . SMC, page 3912-3916. IEEE, (2007)