Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure Data Aggregation Protocol in VANETs Based on Multi-key FHE., , , , and . ICAIS (4), volume 11635 of Lecture Notes in Computer Science, page 178-190. Springer, (2019)Multi-objective Optimization for Data Collection in UAV-assisted Agricultural IoT., , , , , and . CoRR, (2024)A Semi-Tensor Product based Circuit Simulation for SAT-sweeping., , , , , , and . DATE, page 1-6. IEEE, (2024)Scheduling Optimization of Charging UAV in Wireless Rechargeable Sensor Networks., , , and . ISCC, page 1-7. IEEE, (2021)Cryptanalysis on a (k, n)-Threshold Multiplicative Secret Sharing Scheme., , , and . CAA SAFEPROCESS, page 202-207. IEEE, (2019)UAV-enabled Wireless Powered Communication Networks: A Joint Scheduling and Trajectory Optimization Approach., , , , and . ISCC, page 1-7. IEEE, (2022)Joint Power and 3D Trajectory Optimization for UAV-enabled Wireless Powered Communication Networks with Obstacles., , , , , and . CoRR, (2023)Joint Scheduling and Trajectory Optimization of Charging UAV in Wireless Rechargeable Sensor Networks., , , , , and . IEEE Internet Things J., 9 (14): 11796-11813 (2022)DeepGate2: Functionality-Aware Circuit Representation Learning., , , , , , , , , and . ICCAD, page 1-9. IEEE, (2023)3D Position Scheduling of UAV Secure Communications with Multiple Constraints., , , , , , and . SMC, page 143-149. IEEE, (2022)