Author of the publication

Preserving Location Privacy in UASN through Collaboration and Semantic Encapsulation.

, , , , and . IEEE Netw., 34 (4): 284-290 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Access Control Method Against Unauthorized and Noncompliant Behaviors of Real-Time Data in Industrial IoT., , , , and . IEEE Internet Things J., 11 (1): 708-727 (January 2024)Deep Reinforcement Learning for Partially Observable Data Poisoning Attack in Crowdsensing Systems., , , , and . IEEE Internet Things J., 7 (7): 6266-6278 (2020)LocJury: An IBN-Based Location Privacy Preserving Scheme for IoCV., , , , and . IEEE Trans. Intell. Transp. Syst., 22 (8): 5028-5037 (2021)Comment on Lee et al.'s group signature and e-auction scheme., , , , , and . Inf. Syst. Frontiers, 15 (1): 133-139 (2013)Hierarchical Name-based Routing for Content Provider Mobility in ICN., , , , , , and . IWCMC, page 941-946. IEEE, (2023)Uncertain Rule Based Method for Determining Data Currency., , , and . IEICE Trans. Inf. Syst., 101-D (10): 2447-2457 (2018)Preserving Location Privacy in Mobile Edge Computing., , , , and . ICC, page 1-6. IEEE, (2019)Robust Truth Discovery Against Multi-round Data Poisoning Attacks., , , and . WASA (1), volume 13471 of Lecture Notes in Computer Science, page 258-270. Springer, (2022)Bitcoin Network Size Estimation Based on Coupon Collection Model., , , , , , and . ICAIS (4), volume 11635 of Lecture Notes in Computer Science, page 298-307. Springer, (2019)Optimizing Mobility-Aware Task Offloading in Smart Healthcare for Internet of Medical Things Through Multiagent Reinforcement Learning., , , , , and . IEEE Internet Things J., 11 (8): 13677-13691 (April 2024)