Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cloud-Enabled Privacy-Preserving Truth Discovery in Crowd Sensing Systems., , , , , , , , and . SenSys, page 183-196. ACM, (2015)DPcode: Privacy-Preserving Frequent Visual Patterns Publication on Cloud., , , and . IEEE Trans. Multimedia, 18 (5): 929-939 (2016)PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones., , , , , and . IACR Cryptology ePrint Archive, (2013)An Efficient Two-Layer Mechanism for Privacy-Preserving Truth Discovery., , , , , , , and . KDD, page 1705-1714. ACM, (2018)e-PoS: Making Proof-of-Stake Decentralized and Fair., , , , and . CoRR, (2021)Risk assessment of security systems based on entropy theory and the Neyman-Pearson criterion., , , , and . Rel. Eng. & Sys. Safety, (2015)Truth Inference on Sparse Crowdsourcing Data with Local Differential Privacy., , , , and . CoRR, (2018)Toward Hardware-Rooted Smartphone Authentication., , and . IEEE Wireless Commun., 26 (1): 114-119 (2019)CIM: Camera in Motion for Smartphone Authentication., , , and . IEEE Trans. Information Forensics and Security, 14 (11): 2987-3002 (2019)Privacy-Preserving Truth Discovery in Crowd Sensing Systems., , , , , , , , and . TOSN, 15 (1): 9:1-9:32 (2019)