Author of the publication

CRVad: Confidential Reasoning and Verification Towards Secure Routing in Ad Hoc Networks.

, , and . ICA3PP (3), volume 9530 of Lecture Notes in Computer Science, page 449-462. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

I Can Still Observe You: Flow-level Behavior Fingerprinting for Online Social Network., , , , and . GLOBECOM, page 6427-6432. IEEE, (2022)A Single-Pixel Imaging Based Stereo Deflectometry for 3D Reconstruction of Free-Form Transparent Objects With Parasitic Reflections., , , , , and . IEEE Trans. Computational Imaging, (2023)Dimensionality reduction of data sequences for human activity recognition., , , , , and . Neurocomputing, (2016)A Mobile Robot Design for Efficient and Large-Scale Solar Panel Cleaning., , , , , , and . ROBIO, page 70-75. IEEE, (2022)Voxel-Level Radiotherapy Dose Prediction Using Densely Connected Network with Dilated Convolutions., , , , , and . AIRT@MICCAI, volume 11850 of Lecture Notes in Computer Science, page 70-77. Springer, (2019)Relative coordinates constraint for face alignment., , , and . Neurocomputing, (2020)Cloud Computing Task Scheduling Based on Improved Differential Evolution Algorithm., , , , , and . NaNA, page 458-463. IEEE, (2019)Hidden-concept driven image decomposition towards semi-supervised multi-label image annotation., , and . ICIMCS, page 17-24. ACM, (2009)Motion blur removal for humanoid robots., , , and . ICAL, page 378-381. IEEE, (2012)Real-time face attributes recognition via HPGC: horizontal pyramid global convolution., , , and . J. Real Time Image Process., 17 (6): 1829-1840 (2020)