Author of the publication

Privacy-Preserving Location-Based Data Queries in Fog-Enhanced Sensor Networks.

, , and . IEEE Internet Things J., 9 (14): 12285-12299 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Frogs to Think with: Improving Students' Computational Thinking and Understanding of Evolution in A Code-First Learning Environment., , , , , and . IDC, page 246-254. ACM, (2016)MSFD: Multi-Scale Receptive Field Face Detector., , , and . CoRR, (2019)An internet-of-things-based production logistics optimisation method for discrete manufacturing., , , and . Int. J. Computer Integrated Manufacturing, 32 (1): 13-26 (2019)Can Students Edit Their Learner Model Appropriately?., , , and . Intelligent Tutoring Systems, volume 5091 of Lecture Notes in Computer Science, page 674-676. Springer, (2008)An Energy Sensitive Computation Offloading Strategy in Cloud Robotic Network Based on GA., , , and . IEEE Syst. J., 13 (3): 3513-3523 (2019)Incremental small sphere and large margin for online recognition of communication jamming., , , , , and . Appl. Intell., 50 (10): 3429-3440 (2020)A multi-objective optimization evolutionary algorithm incorporating preference information based on fuzzy logic., , , and . Comput. Optim. Appl., 46 (1): 159-188 (2010)Organizational Quality Specific Immune Maturity Evaluation Based on Continuous Interval Number Medium Operator., , and . Symmetry, 12 (6): 918 (2020)An energy sensitive system framework for cloud robotic network., , , , and . Int. J. Commun. Syst., (2019)Verifiable and Forward-secure Encrypted Search Using Blockchain Techniques., , and . ICC, page 1-7. IEEE, (2020)