Author of the publication

A multiple RSU collaborative scheduling scheme for data services in vehicular ad hoc networks.

, , , and . Clust. Comput., 20 (2): 1167-1178 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A multiple RSU collaborative scheduling scheme for data services in vehicular ad hoc networks., , , and . Clust. Comput., 20 (2): 1167-1178 (2017)High speed road boundary detection on the images for autonomous vehicle with the multi-layer CNN., , , , and . ISCAS (5), page 769-772. IEEE, (2003)Efficient Sorting of Homomorphic Encrypted Data with k-way Sorting Network., , , , and . IACR Cryptol. ePrint Arch., (2021)High Speed Road Boundary Detection with CNN-Based Dynamic Programming., , , and . IEEE Pacific Rim Conference on Multimedia, volume 2532 of Lecture Notes in Computer Science, page 806-813. Springer, (2002)A secure SNP panel scheme using homomorphically encrypted K-mers without SNP calling on the user side., , , , , , , and . BMC Genom., (2019)An analysis of security systems for electronic information for establishing secure internet of things environments: Focusing on research trends in the security field in South Korea., , , , and . Future Gener. Comput. Syst., (2018)Privacy-preserving Approximate GWAS computation based on Homomorphic Encryption., , , , , and . IACR Cryptol. ePrint Arch., (2019)Efficient Logistic Regression on Large Encrypted Data., , , and . IACR Cryptol. ePrint Arch., (2018)A Hybrid of Dual and Meet-in-the-Middle Attack on Sparse and Ternary Secret LWE., , , and . IACR Cryptol. ePrint Arch., (2019)Polynomial Functional Encryption Scheme with Linear Ciphertext Size., , , and . IACR Cryptol. ePrint Arch., (2018)