Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Edge-Assisted Image Processing with Joint Optimization of Responding and Placement Strategy., , , and . iThings/GreenCom/CPSCom/SmartData, page 1241-1248. IEEE, (2019)QuickN: Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data., , and . IEEE Trans. Cloud Comput., 10 (3): 2066-2078 (2022)Security and Privacy in Internet of Things with Crowd-Sensing., , , , and . J. Electr. Comput. Eng., (2017)Game theoretical analysis of coexistence in MIMO-empowered Cognitive Radio Networks., , and . ICNC, page 155-161. IEEE Computer Society, (2017)EDOS: Edge Assisted Offloading System for Mobile Devices., , , and . CoRR, (2017)CAPIA: Cloud assisted privacy-preserving image annotation., , and . CNS, page 1-9. IEEE, (2017)CPAR: Cloud-Assisted Privacy-preserving Image Annotation with Randomized k-d Forest., , and . EAI Endorsed Trans. Security Safety, 6 (22): e5 (2020)Making Wireless Body Area Networks Robust Under Cross-Technology Interference., , and . IEEE Trans. Wirel. Commun., 16 (1): 429-440 (2017)Message Integrity Protection Over Wireless Channel: Countering Signal Cancellation via Channel Randomization., , , , , , and . IEEE Trans. Dependable Secur. Comput., 17 (1): 106-120 (2020)Flexibly and Securely Shape Your Data Disclosed to Others., , , , , and . AsiaCCS, page 160-167. ACM, (2019)