Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Delay-Tolerant Flexible Data Access Control for Smart Grid with Renewable Energy Resources., , , , , and . CoRR, (2018)An Efficient Encryption Scheme with Verifiable Outsourced Decryption in Mobile Cloud Computing., , , , and . CoRR, (2018)An Approach of Secure Two-Way-Pegged Multi-sidechain., , , and . ICA3PP (2), volume 11945 of Lecture Notes in Computer Science, page 551-564. Springer, (2019)A Low-Latency Secure Data Outsourcing Scheme for Cloud-WSN., , , , and . WCNC, page 1-6. IEEE, (2017)When privacy meets economics: Enabling differentially-private battery-supported meter reporting in smart grid., , , , , and . IWQoS, page 1-9. IEEE, (2017)The "Fuzzy" Repair of Urban Building Facade Point Cloud Based on Distribution Regularity., , , , , and . Remote. Sens., 14 (5): 1090 (2022)Attack-Resilient TLS Certificate Transparency., , , , , and . IEEE Access, (2020)Big Data Mining of Users' Energy Consumption Patterns in the Wireless Smart Grid., , , , and . IEEE Wirel. Commun., 25 (1): 84-89 (2018)CSG: Curriculum Representation Learning for Signed Graph., , , , , , , and . CoRR, (2023)How to protect query and report privacy without sacrificing service quality in participatory sensing., , , , and . IPCCC, page 1-7. IEEE Computer Society, (2015)