Author of the publication

A Privacy-Preserving Outsourcing Computing Scheme Based on Secure Trusted Environment.

, , , , , , and . IEEE Trans. Cloud Comput., 11 (3): 2325-2336 (July 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constructing a self-stabilizing CDS with bounded diameter in wireless networks under SINR., , , , and . INFOCOM, page 1-9. IEEE, (2017)Application of Graph Regularized Non-negative Matrix Factorization in Characteristic Gene Selection., , , , and . ICIC (2), volume 9226 of Lecture Notes in Computer Science, page 601-611. Springer, (2015)"Time-Location-Frequency"-aware Internet of things service selection based on historical records., , , , and . IJDSN, (2017)Adaptive fault-tolerant consensus for a class of leader-following systems using neural network learning strategy., , , , and . Neural Networks, (2020)RPAR: Location Privacy Preserving via Repartitioning Anonymous Region in Mobile Social Network., , , , , and . Secur. Commun. Networks, (2018)On the fractional f-chromatic index of a graph., , and . Int. J. Comput. Math., 87 (15): 3359-3369 (2010)On the Stable Throughput in Wireless LANs., , , and . WASA, volume 9204 of Lecture Notes in Computer Science, page 745-755. Springer, (2015)A nonlinear and noise-tolerant ZNN model solving for time-varying linear matrix equation., , , and . Neurocomputing, (2018)Pareto-optimal Algorithms for Scheduling Games on Parallel-batching Machines with Activation Cost., , and . Asia Pac. J. Oper. Res., 38 (5): 2140007:1-2140007:15 (2021)Covert communications with friendly jamming in Internet of vehicles., , , , and . Veh. Commun., (2022)