Author of the publication

Limiting User's Sybil Attack in Resource Sharing.

, , , , and . WINE, volume 10660 of Lecture Notes in Computer Science, page 103-119. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Domain-Specific Chinese Word Segmentation Based on Bi-Directional Long-Short Term Memory Model., , , , , , and . IEEE Access, (2019)Design of Automatic Driving Safety Level and Positioning Accuracy., , , , and . CoRR, (2022)Improved Bilateral Filter with Application to Artifact Noise Reduction., , , , , , and . J. Medical Imaging Health Informatics, 9 (3): 628-636 (2019)Gender Classification of Weblog Authors., and . AAAI Spring Symposium: Computational Approaches to Analyzing Weblogs, page 228-230. AAAI, (2006)Uncertainties of Interpolating Satellite-Specific Slant Ionospheric Delays and Impacts on PPP-RTK., , , , , and . IEEE Trans. Aerosp. Electron. Syst., 60 (1): 490-505 (February 2024)Dynamic Bandwidth Scheduling of Software Defined Networked Collaborative Control System., , and . IEEE Access, (2020)Latent Dirichlet Allocation for Internet Price War., , , , , , , , and . AAAI, page 639-646. AAAI Press, (2019)Cost-Effective Incentive Allocation via Structured Counterfactual Inference., , , , , , and . AAAI, page 4997-5004. AAAI Press, (2020)Tight Incentive Analysis on Sybil Attacks to Market Equilibrium of Resource Exchange over General Networks., , , and . EC, page 792-793. ACM, (2022)Chinese Named Entity Recognition Based on Grid Tagging and Semantic Segmentation., , , and . CCIS, page 289-294. IEEE, (2023)