Author of the publication

AIoT-Cloud-Integrated Smart Livestock Surveillance via Assembling Deep Networks with Considering Robustness and Semantics Availability.

, , , , , and . IEEE Robotics Autom. Lett., 6 (4): 6140-6147 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A threshold-based key generation approach for ciphertext-policy attribute-based encryption., , and . ICUFN, page 908-913. IEEE, (2015)Service-Oriented Device Composition in Resource Constrained Ubiquitous Environments., , , and . WCNC, page 3110-3115. IEEE, (2008)An Efficient Mobile AR Navigation System Using Polygon Approximation Based Data Acquisition., and . WICON, volume 264 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 215-224. Springer, (2018)A Transparently-Secure and Robust Stock Data Supply Framework for Financial-Technology Applications., , , , , , , , and . ACIIDS, volume 12672 of Lecture Notes in Computer Science, page 616-629. Springer, (2021)Development of Graphical Editor for Supervisory Control and Data Acquisition System in Agriculture Greenhouse., , , , , and . ICS, volume 274 of Frontiers in Artificial Intelligence and Applications, page 561-571. IOS Press, (2014)Node capability aware resource provisioning in a heterogeneous cloud., and . ICCC, page 46-50. IEEE, (2012)Two-Layered Dynamic Key Management in Mobile and Long-Lived Cluster-Based Wireless Sensor Networks., , , , and . WCNC, page 4145-4150. IEEE, (2007)EstiTO: An Efficient Task Offloading Approach Based on Node Capability Estimation in a Cloudlet., and . WCNC, page 1-6. IEEE, (2017)Cloud access control in multi-layer cloud networks., , , and . ICCE-TW, page 364-365. IEEE, (2015)Secure computation offloading based on social trust in mobile networks., , and . ICUFN, page 75-80. IEEE, (2014)