Author of the publication

A unified face identification and resolution scheme using cloud computing in Internet of Things.

, , , , , and . Future Gener. Comput. Syst., (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Software-Defined Edge Computing (SDEC): Principles, Open System Architecture and Challenges., and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 8-16. IEEE, (2019)The product quality inspection scheme based on software-defined edge intelligent controller in industrial internet of things., , , and . J. Cloud Comput., 12 (1): 113 (December 2023)AFace: Range-flexible Anti-spoofing Face Authentication via Smartphone Acoustic Sensing., , , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 8 (1): 26:1-26:33 (March 2024)Software-Defined Edge Computing (SDEC): Principle, Open IoT System Architecture, Applications, and Challenges., , , , and . IEEE Internet Things J., 7 (7): 5934-5945 (2020)Federated Learning Hyperparameter Tuning From a System Perspective., , , , , , and . IEEE Internet Things J., 10 (16): 14102-14113 (August 2023)Model Poisoning Attack on Neural Network Without Reference Data., , , , , , and . IEEE Trans. Computers, 72 (10): 2978-2989 (October 2023)LCL-filter resonance suppression in grid-connected inverter based on strictly real positive plant strategy., , , and . Int. J. Circuit Theory Appl., 51 (1): 177-196 (January 2023)Towards Automatic Detection of Nonfunctional Sensitive Transmissions in Mobile Applications., , , , , , , and . IEEE Trans. Mob. Comput., 20 (10): 3066-3080 (2021)Towards Unconstrained Vocabulary Eavesdropping With mmWave Radar Using GAN., , , , , , , , , and . IEEE Trans. Mob. Comput., 23 (1): 941-954 (January 2024)Towards System-Level Security Analysis of IoT Using Attack Graphs., , , , , , and . IEEE Trans. Mob. Comput., 23 (2): 1142-1155 (February 2024)