Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A IoT Terminal Position Recognition Method Based on RSSI and Magnetic Field in A Low Trust Environment., , , , , , , and . CBD, page 327-332. IEEE, (2021)Fake Reviewer Group Detection in Online Review Systems., , , and . ICDM (Workshops), page 935-942. IEEE, (2021)Workload Prediction in Edge Computing based on Graph Neural Network., , , , , , , and . ISPA/BDCloud/SocialCom/SustainCom, page 1663-1666. IEEE, (2021)Efficient Edge Service Migration in Mobile Edge Computing., , , , , , and . ICPADS, page 691-696. IEEE, (2020)Adaptive DNN Partition in Edge Computing Environments., , , , , and . ICPADS, page 685-690. IEEE, (2020)State Space Model for New-Generation Network Alternative to Transformers: A Survey., , , , , , , , , and 6 other author(s). CoRR, (2024)Security Analysis of Cryptocurrency Wallets in Android-Based Applications., , , , , , and . IEEE Netw., 34 (6): 114-119 (2020)Terrain Preview Detection and Classification in Unstructured Scenes Based on Vision and Laser Fusion With Deep Learning., , , , , , , and . IEEE Access, (2024)Reconfigurable physical unclonable cryptographic primitives based on current-induced nanomagnets switching., , , , , , and . Sci. China Inf. Sci., (2022)PEDR: Exploiting phase error drift range to detect full-model rogue access point attacks., , , and . Comput. Secur., (2022)