Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BlockShare: A Blockchain Empowered System for Privacy-Preserving Verifiable Data Sharing., , , and . IEEE Data Eng. Bull., 45 (2): 14-24 (2022)A structured multi-head attention prediction method based on heterogeneous financial data., , , , and . PeerJ Comput. Sci., (2023)Indoor Floor Plan Construction Through Sensing Data Collected From Smartphones., , , , , and . IEEE Internet Things J., 5 (6): 4351-4364 (2018)CrowdGIS: Updating Digital Maps via Mobile Crowdsensing., , , , and . IEEE Trans Autom. Sci. Eng., 15 (1): 369-380 (2018)Vehicle Safety Improvement through Deep Learning and Mobile Sensing., , , , and . IEEE Netw., 32 (4): 28-33 (2018)Smartphone-assisted energy efficient data communication for wearable devices., , , , and . Comput. Commun., (2017)SymmeProof: Compact Zero-Knowledge Argument for Blockchain Confidential Transactions., , , , and . IEEE Trans. Dependable Secur. Comput., 20 (3): 2289-2301 (May 2023)Power Adjusting and Bribery Racing: Novel Mining Attacks in the Bitcoin System., , , and . CCS, page 833-850. ACM, (2019)A Low-Cost Embedded Controller for Complex Control Systems., , and . EUC (1), page 23-29. IEEE Computer Society, (2008)FloodDefender: Protecting data and control plane resources under SDN-aimed DoS attacks., , , , and . INFOCOM, page 1-9. IEEE, (2017)