Author of the publication

Security level protection for intelligent terminals based on differential privacy.

, , , and . Telecommun. Syst., 74 (4): 425-435 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A level-based multi-strategy learning swarm optimizer for large-Scale multi-objective optimization., , , and . Swarm Evol. Comput., (2022)A New Temperature Correction Method for NaI(Tl) Detectors Based on Pulse Deconvolution., , , , , , and . Sensors, 23 (11): 5083 (2023)A novel coordinated motion planner based on capability map for autonomous mobile manipulator., , , , , and . Robotics Auton. Syst., (2020)A Prediction Approach to End-to-End Traffic in Space Information Networks., , and . ICII, page 115-119. IEEE, (2019)ImmCluster: an ensemble resource for immunology cell type clustering and annotations in normal and cancerous tissues., , , , , , , , and . Nucleic Acids Res., 51 (D1): 1325-1332 (January 2023)Task-oriented base position estimation for mobile TCM massage robot., , , and . M2VIP, page 732-737. IEEE, (2021)An adaptive group decision making framework: Individual and local world opinion based opinion dynamics., , , and . Inf. Fusion, (2022)Active Measurement Approach to Traffic QoS Sensing for Smart Network Access in SDN., , , , , and . ICII, page 103-108. IEEE, (2019)A novel realtime vision-based acupoint estimation for TCM massage robot., , and . M2VIP, page 771-776. IEEE, (2021)Multi-Target Invisibly Trojaned Networks for Visual Recognition and Detection., , , and . IJCAI, page 3462-3469. ijcai.org, (2021)