Author of the publication

Incentivizing Crowdsensing With Location-Privacy Preserving.

, , , , , and . IEEE Trans. Wirel. Commun., 16 (10): 6940-6952 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The application of remote sensing and geographic information system on mineral resource planning., , , and . IGARSS, page 1632-1635. IEEE, (2005)Phenotyping of Corn Plants Using Unmanned Aerial Vehicle (UAV) Images., , , , , , , and . Remote. Sens., 11 (17): 2021 (2019)Single image dehazing using kernel regression model and dark channel prior., , , and . Signal Image Video Process., 11 (4): 705-712 (2017)Fostering User Engagement: Rhetorical Devices for Applause Generation Learnt from TED Talks., , , , and . ICWSM, page 592-595. AAAI Press, (2017)A Bridged Contactless Measurement Technique for LC Tank Based Voltage-Controlled Oscillator., , , , and . J. Electron. Test., 33 (2): 261-266 (2017)Research on Multi-Sensor Fusion SLAM Algorithm Based on Improved Gmapping., , , , and . IEEE Access, (2023)An uncertain support vector machine based on soft margin method., , and . J. Ambient Intell. Humaniz. Comput., 14 (9): 12949-12958 (2023)Supervised and Semi-supervised Methods for Abdominal Organ Segmentation: A Review., and . Int. J. Autom. Comput., 18 (6): 887-914 (2021)Survive and Thrive: A Stochastic Game for DDoS Attacks in Bitcoin Mining Pools., , , , , and . IEEE/ACM Trans. Netw., 28 (2): 874-887 (2020)An Index-Based Provenance Compression Scheme for Identifying Malicious Nodes in Multihop IoT Network., and . IEEE Internet Things J., 7 (5): 4061-4071 (2020)