Author of the publication

A differential privacy protection scheme for sensitive big data in body sensor networks.

, , , , , and . Ann. des Télécommunications, 71 (9-10): 465-475 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Internet of things delay application driven measurement and optimization technology in edge computing environment., , and . J. Intell. Fuzzy Syst., 37 (5): 5849-5856 (2019)Efficient Latency Bound Analysis for Data Chains of Real-Time Tasks in Multiprocessor Systems., , , , , and . DATE, page 436-441. IEEE, (2020)A Clustering K-Anonymity Scheme for Location Privacy Preservation., , , , , and . IEICE Trans. Inf. Syst., 95-D (1): 134-142 (2012)Affinity-Aware VNF Placement in Mobile Edge Clouds via Leveraging GPUs., , , , , , , and . IEEE Trans. Computers, 70 (12): 2234-2248 (2021)A Handwriting Recognition System With WiFi., , , , , , , and . IEEE Trans. Mob. Comput., 23 (4): 3391-3409 (April 2024)NFV-Enabled IoT Service Provisioning in Mobile Edge Clouds., , , , , and . IEEE Trans. Mob. Comput., 20 (5): 1892-1906 (2021)Near Optimal Charging Schedule for 3-D Wireless Rechargeable Sensor Networks., , , , , , , and . IEEE Trans. Mob. Comput., 22 (6): 3525-3540 (June 2023)Maximizing Charging Efficiency With Fresnel Zones., , , , , , and . IEEE Trans. Mob. Comput., 23 (1): 612-629 (January 2024)TSCA: A Temporal-Spatial Real-Time Charging Scheduling Algorithm for On-Demand Architecture in Wireless Rechargeable Sensor Networks., , , , , and . IEEE Trans. Mob. Comput., 17 (1): 211-224 (2018)Protecting location privacy and query privacy: a combined clustering approach., , and . Concurr. Comput. Pract. Exp., 27 (12): 3021-3043 (2015)