Author of the publication

Leveraging Crowd to improve data credibility for mobile crowdsensing.

, , , and . ISCC, page 561-568. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Half-sweep RSOR iteration with three-point linear rational finite difference scheme for solving first-order Fredholm integro-differential equations., , and . Int. J. Comput. Sci. Math., 17 (2): 182-194 (2023)Mixed-UNet: Refined class activation mapping for weakly-supervised semantic segmentation with multi-scale inference., , , , , , , , , and 6 other author(s). Frontiers Comput. Sci., (2022)On the characterization of some algebraically defined bipartite graphs of girth eight., , and . Discret. Appl. Math., (2021)An interpretable artificial intelligence system for detecting risk factors of gastroesophageal variceal bleeding., , , , , , , , , and 6 other author(s). npj Digit. Medicine, (2022)Towards Face Presentation Attack Detection Based on Residual Color Texture Representation., , , and . Secur. Commun. Networks, (2021)Computing Offloading Based on TD3 Algorithm in Cache-Assisted Vehicular NOMA-MEC Networks., , , , , and . Sensors, 23 (22): 9064 (November 2023)Capturing a spacecraft around a flyby asteroid using Hamiltonian-structure-preserving control., , , , and . Commun. Nonlinear Sci. Numer. Simul., (2021)A Scale-Space Medialness Transform Based on Boundary Concordance Voting., and . J. Math. Imaging Vis., 11 (3): 277-299 (1999)Intrusion Detecting System Based on Temporal Convolutional Network for In-Vehicle CAN Networks., , , and . Mob. Inf. Syst., (2021)Double-Layered Random Coding for Secret Key Generation in Gaussian Wiretap Channels., and . IEEE Commun. Lett., 24 (2): 264-267 (2020)