Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LoRe: Supporting Non-deterministic Events Logging and Replay for KVM Virtual Machines., , , , and . HPCC/EUC, page 442-449. IEEE, (2013)CloudAP: Improving the QoS of Mobile Applications with Efficient VM Migration., , , , , and . HPCC/EUC, page 1374-1381. IEEE, (2013)VMCSnap: Taking Snapshots of Virtual Machine Cluster with Memory Deduplication., , , , , and . SOSE, page 314-319. IEEE Computer Society, (2014)Security and Privacy in Smart Cities: Challenges and Opportunities., , , , and . IEEE Access, (2018)Vanguard: A Cache-Level Sensitive File Integrity Monitoring System in Virtual Machine Environment., , , and . IEEE Access, (2018)Improving Data Utility Through Game Theory in Personalized Differential Privacy., , , , , and . J. Comput. Sci. Technol., 34 (2): 272-286 (2019)Neural network adaptive control design for robot manipulators under velocity constraints., , and . J. Franklin Institute, 355 (2): 693-713 (2018)Neural Melody Composition from Lyrics., , , , , , , and . CoRR, (2018)Privacy issues in social networks and analysis: a comprehensive survey., , , and . IET Networks, 7 (2): 74-84 (2018)A Trust-Grained Personalized Privacy-Preserving Scheme for Big Social Data., , , , and . ICC, page 1-6. IEEE, (2018)