From post

Image Content Location Privacy Preserving in Social Network Travel Image Sharing.

, , , и . ICAIS (2), том 12240 из Lecture Notes in Computer Science, стр. 617-628. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Lightweight Federated Learning for Large-Scale IoT Devices With Privacy Guarantee., , , , , и . IEEE Internet Things J., 10 (4): 3179-3191 (февраля 2023)Cooperative Computation Offloading and Resource Allocation for Blockchain-Enabled Mobile-Edge Computing: A Deep Reinforcement Learning Approach., , , , , и . IEEE Internet Things J., 7 (7): 6214-6228 (2020)Computation Offloading and Resource Allocation for Wireless Powered Mobile Edge Computing With Latency Constraint., , , , и . IEEE Wirel. Commun. Lett., 8 (5): 1320-1323 (2019)Asynchronous Deep Reinforcement Learning for Collaborative Task Computing and On-Demand Resource Allocation in Vehicular Edge Computing., , , , , и . IEEE Trans. Intell. Transp. Syst., 24 (12): 15513-15526 (декабря 2023)A Privacy-Preserving Ride-Matching Scheme Without a Trusted Third-Party Server., , , , и . IEEE Syst. J., 17 (4): 6413-6424 (декабря 2023)QoE Fairness Resource Allocation in Digital Twin-Enabled Wireless Virtual Reality Systems., , , , и . IEEE J. Sel. Areas Commun., 41 (11): 3355-3368 (ноября 2023)Speed Adjustment Attack on Cooperative Sensing in Cognitive Vehicular Networks., , , и . IEEE Access, (2019)A Proximity-Based Concurrent Access Strategy to Improve Throughput in VANETs., , , , , и . IJDSN, (2013)Privacy-Preserving Verification and Root-Cause Tracing Towards UAV Social Networks., , , , , и . ICC, стр. 1-6. IEEE, (2019)QuickAuth: Two-Factor Quick Authentication Based on Ambient Sound., , и . GLOBECOM, стр. 1-6. IEEE, (2016)