Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dataset Obfuscation: Its Applications to and Impacts on Edge Machine Learning., , , , , and . CoRR, (2022)Maximizing NFT Incentives: References Make You Rich., , , , , and . CoRR, (2024)An Adaptive Swarm Intelligence-Based Task Scheduling Framework for Heterogeneous IoT Systems., , , , and . ICNCC, page 114-119. ACM, (2021)TbDd: A new trust-based, DRL-driven framework for blockchain sharding in IoT., , , , , , , , , and . Comput. Networks, (2024)Decentralized, Revocable and Verifiable Attribute-Based Encryption in Hybrid Cloud System., , , , , , and . Wirel. Pers. Commun., 106 (2): 719-738 (2019)Location Privacy Threats and Protections in Future Vehicular Networks: A Comprehensive Review., , , , , , , , , and . CoRR, (2023)Secure multi-keyword ranked search over encrypted cloud data for multiple data owners., , , , and . J. Syst. Softw., (2018)A First Look into Blockchain DAOs., , , , , , and . ICBC, page 1-3. IEEE, (2023)DexX: A Double Layer Unpacking Framework for Android., , , , , and . IEEE Access, (2018)DroidPDF: The Obfuscation Resilient Packer Detection Framework for Android Apps., , , , , and . IEEE Access, (2020)