Author of the publication

Key-Leakage Resilient Encrypted Data Aggregation With Lightweight Verification in Fog-Assisted Smart Grids.

, , , , , and . IEEE Internet Things J., 8 (10): 8234-8245 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Beaconless dual-channel Real-Time Routing Protocol for wireless sensor networks.. ICCAIS, page 16-21. IEEE, (2015)Topic mining of tourist attractions based on a seasonal context aware LDA model., , , and . Intell. Data Anal., 22 (2): 383-405 (2018)Delta Operator-Based Model Predictive Control With Fault Compensation for Steer-by-Wire Systems., , and . IEEE Trans. Syst. Man Cybern. Syst., 50 (6): 2257-2272 (2020)Scheduling of a Parcel Delivery System Consisting of an Aerial Drone Interacting with Public Transportation Vehicles., , and . Sensors, 20 (7): 2045 (2020)iVI-TD-DFT: An iterative vector interaction method for exterior/interior roots of TD-DFT., and . J. Comput. Chem., 40 (9): 1023-1037 (2019)Toward local family relationship discovery in location-based social network., , , and . Soc. Netw. Anal. Min., 7 (1): 27:1-27:21 (2017)Enabling identity-based authorized encrypted diagnostic data sharing for cloud-assisted E-health information systems., , , , and . J. Inf. Secur. Appl., (2020)Mode Consensus Algorithms With Finite Convergence Time., , , and . CoRR, (2024)Enforcing Hard Constraints with Soft Barriers: Safe Reinforcement Learning in Unknown Stochastic Environments., , , , , , , , and . CoRR, (2022)SaliencyCut: Augmenting Plausible Anomalies for Open-set Fine-Grained Anomaly Detection., , , , , and . CoRR, (2023)