Author of the publication

Discrete Particle Swarm Optimization Routing Protocol for Wireless Sensor Networks with Multiple Mobile Sinks.

, , , and . Sensors, 16 (7): 1081 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

One-off Disclosure Control by Heterogeneous Generalization., , , , and . USENIX Security Symposium, page 3363-3377. USENIX Association, (2022)A framework to enforce access control over data streams., , , and . ACM Trans. Inf. Syst. Secur., 13 (3): 28:1-28:31 (2010)Active learning for accurate analysis of streaming partial discharge data., , , , , and . ICPHM, page 1-5. IEEE, (2015)Privacy-preserving survey by crowdsourcing with smartphones., , and . WF-IoT, page 647-651. IEEE, (2018)DAG: A General Model for Privacy-Preserving Data Mining : (Extended Abstract)., , and . ICDE, page 2018-2019. IEEE, (2020)ASSIST: access controlled ship identification streams., , , , , and . GIS, page 485-488. ACM, (2011)Active Learning for On-Line Partial Discharge Monitoring in Noisy Environments., , , , and . MDM (Workshops), page 37-42. IEEE Computer Society, (2016)DBMask: Fine-Grained Access Control on Encrypted Relational Databases., , , and . CODASPY, page 1-11. ACM, (2015)DAG: A Model for Privacy Preserving Computation., , and . ICWS, page 289-296. IEEE Computer Society, (2015)CASTLE: A delay-constrained scheme for ks-anonymizing data streams., , , and . ICDE, page 1376-1378. IEEE Computer Society, (2008)