Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-preserving combinatorial auction without an auctioneer., , , , , and . EURASIP J. Wireless Comm. and Networking, (2018)Parametric Bootstrap Tests for Unbalanced Three-factor Nested Designs under Heteroscedasticity., , , , and . Communications in Statistics - Simulation and Computation, 45 (1): 322-338 (2016)Information Acquisition in Desert Ant Navigation., , , and . Int. J. Inf. Acquis., 3 (1): 33-43 (2006)FFRLI: Fast fault recovery scheme based on link importance for data plane in SDN., , , , and . Comput. Networks, (December 2023)Design and simulation of reverse-blocking Schottky-drain AlN/AlGaN HEMTs with drain field plate., , , , , , , , , and 4 other author(s). Sci. China Inf. Sci., (2022)Inference attacks based on neural networks in social networks., , , , and . HotWeb, page 10:1-10:6. ACM, (2017)Personal Information Inference in Social Networks., , , , and . PAC, page 196-197. IEEE, (2017)A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes., , , , , and . IIKI, page 519-524. IEEE Computer Society, (2016)Blockchain for Large-Scale Internet of Things Data Storage and Protection., , , , , and . IEEE Trans. Serv. Comput., 12 (5): 762-771 (2019)Ultraviolet Radiation Measurement via Smart Devices., , , , and . IEEE Internet Things J., 4 (4): 934-944 (2017)