Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trust, security and privacy for pervasive applications., , and . J. Supercomput., 64 (3): 661-663 (2013)Comments and Corrections., , , , , , and . IEEE Trans. Comput. Soc. Syst., 3 (1): 42 (2016)Optimal Multicast Tree Routing for Cluster Computing in Hypercube Interconnection Networks., , , , and . IEICE Trans. Inf. Syst., 87-D (7): 1625-1632 (2004)FogRoute: DTN-Based Data Dissemination Model in Fog Computing., , , , and . IEEE Internet Things J., 4 (1): 225-235 (2017)Density-Based Location Preservation for Mobile Crowdsensing With Differential Privacy., , , and . IEEE Access, (2018)An effective privacy preserving algorithm for neighborhood-based collaborative filtering., , , , and . Future Gener. Comput. Syst., (2014)M-Dimension: Multi-characteristics based routing protocol in human associated delay-tolerant networks with improved performance over one dimensional classic models., , , , and . J. Netw. Comput. Appl., 35 (4): 1285-1296 (2012)Special Issue: Network Attacks and Defense Systems., , and . Comput. Syst. Sci. Eng., (2008)Revisiting model fairness via adversarial examples., , , , and . Knowl. Based Syst., (October 2023)A system for managing remote procedure call transactions., and . J. Syst. Softw., 34 (2): 133-149 (1996)