Author of the publication

Detecting Attacks Smartly in Vehicle Cloud Computing.

, , , , and . UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld, page 245-252. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward Location based Vehicular Networks in Urban Environments., , , and . FNC/MobiSPC, volume 34 of Procedia Computer Science, page 442-449. Elsevier, (2014)Ring based wavelet transform with arbitrary supports in wireless sensor networks., , and . EUSIPCO, page 1-5. IEEE, (2006)Compressing Spatial and Temporal Correlated Data in Wireless Sensor Networks Based on Ring Topology., , , , and . WAIM, volume 4016 of Lecture Notes in Computer Science, page 337-348. Springer, (2006)A two-phase representation based face recognition method with 'random-filtering' virtual samples., , , and . IJCNN, page 101-107. IEEE, (2017)Power in Silence: Revealing the Stationarity of Private-owned Vehicle in Urban Vehicular Ad Hoc Networks., , and . DIVANet@MSWiM, page 131-138. ACM, (2016)Privacy-Preserving for Dynamic Real-Time Published Data Streams Based on Local Differential Privacy., and . IEEE Internet Things J., 11 (8): 13551-13562 (April 2024)Pedestrian Trajectory Prediction Based on Social Interactions Learning With Random Weights., , , , , , , and . IEEE Trans. Multim., (2024)Volatility-Based Measurements Allocation for Distributed Data Storage in Mobile Crowd Sensing., , and . IEEE Syst. J., 17 (4): 6665-6675 (December 2023)Compressive networked storage with lazy-encoding., , , and . ICASSP, page 6443-6447. IEEE, (2018)Secure Ranked Multi-keyword Search for Multiple Data Owners in Cloud Computing., , , , and . DSN, page 276-286. IEEE Computer Society, (2014)