Author of the publication

Pseudonym-based Privacy Protection Scheme for Participatory Sensing with Incentives.

, , , and . TIIS, 10 (11): 5654-5673 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A new full-rate full-diversity orthogonal space-time block coding scheme., and . IEEE Communications Letters, 7 (12): 590-592 (2003)Driving intention recognition and behaviour prediction based on a double-layer hidden Markov model., , and . Journal of Zhejiang University - Science C, 13 (3): 208-217 (2012)Modeling and Design of Chip-Package Interface., , , and . ISQED, page 6. IEEE Computer Society, (2005)Empirical Research on the Factors Affecting of Enterprise's Brand Competitiveness Based on the Consumer's Point of View., and . WHICEB, page 12. Association for Information Systems, (2012)Cloud Avoidance Scheduling Algorithm for Agile Optical Satellites., , , and . BIC-TA, volume 562 of Communications in Computer and Information Science, page 161-172. Springer, (2015)Soil moisture monitoring based on HJ-1C S-band SAR image and experimental data., , , , and . IGARSS, page 3754-3757. IEEE, (2013)Sequence generation error (SGE) minimization based deep neural networks training for text-to-speech synthesis., , , and . INTERSPEECH, page 864-868. ISCA, (2015)Joint Event Extraction Based on Hierarchical Event Schemas From FrameNet., , , , and . IEEE Access, (2019)Learning latent representations for style control and transfer in end-to-end speech synthesis., , , and . CoRR, (2018)Modeling Multi-speaker Latent Space to Improve Neural TTS: Quick Enrolling New Speaker and Enhancing Premium Voice., , and . CoRR, (2018)