Author of the publication

The Design and Implementation of A Cost-effective RFID Indoor Localization System.

, , , , and . CSAR@SenSys, page 1-6. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive Robust Stabilization of a Flexible Timoshenko Manipulator., , , , , and . ICARM, page 565-569. IEEE, (2019)Insecurity of A Key-Policy Attribute Based Encryption Scheme With Equality Test., , , , , and . IEEE Access, (2018)the Connection between Cryptography and Differential Privacy: a Survey., , , and . CoRR, (2020)Improving Laplace Mechanism of Differential Privacy by Personalized Sampling., , , , , and . TrustCom, page 623-630. IEEE, (2020)The Trust Management Model of Trusted Software., , , and . IFITA (3), page 534-537. IEEE Computer Society, (2009)Privacy-Preservation in Distributed Deep Neural Networks via Encryption of Selected Gradients., , , and . HPCC/DSS/SmartCity, page 816-823. IEEE, (2020)Security Analysis of a Certificateless Provable Data Possession Scheme in Cloud., , , and . IEEE Access, (2019)A Deniably Authenticated Searchable Public Key Encryption Scheme in Mobile Electronic Mail System., , , , and . IACR Cryptol. ePrint Arch., (2024)Spark Performance Optimization Analysis in Memory Tuning On GC Overhead for Big Data Analytics., , and . ICNCC, page 75-78. ACM, (2019)Privacy preservation in Distributed Deep Learning: A survey on Distributed Deep Learning, privacy preservation techniques used and interesting research directions., , , , , and . J. Inf. Secur. Appl., (2021)