Author of the publication

Privacy on the Edge: Customizable Privacy-Preserving Context Sharing in Hierarchical Edge Computing.

, , , , , and . IEEE Trans. Netw. Sci. Eng., 7 (4): 2298-2309 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-Level Virtual Ring: Cross-Level Name Routing with Embedded Identifier in Sensor Network., and . ICWN, page 67-74. CSREA Press, (2009)A Hybrid Privacy Protection Scheme in Cyber-Physical Social Networks., , , , and . IEEE Trans. Comput. Soc. Syst., 5 (3): 773-784 (2018)Privacy on the Edge: Customizable Privacy-Preserving Context Sharing in Hierarchical Edge Computing., , , , , and . IEEE Trans. Netw. Sci. Eng., 7 (4): 2298-2309 (2020)Fog Computing: Survey of Trends, Architectures, Requirements, and Research Directions., , , , , , and . CoRR, (2018)Prototypes-Guided Memory Replay for Continual Learning., , , , and . CoRR, (2021)Temporal Knowledge Graph Completion: A Survey., , , , , and . CoRR, (2022)A fast and scalable authentication scheme in IOT for smart living., , , , , , and . Future Gener. Comput. Syst., (2021)Hybrid variational autoencoder for time series forecasting., , , and . Knowl. Based Syst., (December 2023)FL-SEC: Privacy-Preserving Decentralized Federated Learning Using SignSGD for the Internet of Artificially Intelligent Things., , , , and . IEEE Internet Things Mag., 5 (1): 85-90 (2022)A Fast and Scalable Authentication Scheme in IoT for Smart Living., , , , , , and . CoRR, (2020)