Author of the publication

User interactive Internet of things privacy preserved access control.

, , , , and . ICITST, page 597-602. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Increasing bandwidth utilization in next generation iptv networks., and . ICIP, page 2075-2078. IEEE, (2004)A Novel Data Mining Method on Falling Detection and Daily Activities Recognition., , , and . ICTAI, page 675-681. IEEE Computer Society, (2015)Distributed data gathering scheduling protocol for wireless sensor actor and actuator networks., , and . ICC, page 7120-7125. IEEE, (2012)Joint power and spectrum optimization in wireless localization networks., , , , , and . ICC Workshops, page 859-864. IEEE, (2015)Short Paper: 'A peer to peer security protocol for the internet of things': Secure communication for the sensiblethings platform., and . ICIN, page 154-156. IEEE, (2015)Enhanced data extraction, transforming and loading processing for Traditional Chinese Medicine clinical data warehouse., , , , and . Healthcom, page 57-61. IEEE, (2012)Method of the Road Lines Recognition in the Maps of Digital Material Based on Improvemented BP Neural Network., , , and . CSISE (1), volume 104 of Advances in Intelligent and Soft Computing, page 113-117. Springer, (2011)User interactive Internet of things privacy preserved access control., , , , and . ICITST, page 597-602. IEEE, (2012)A transfer learning approach to cross-database facial expression recognition., , , and . ICB, page 293-298. IEEE, (2015)LPED: Channel diagnostics in WSN through channel coding and symbol error statistics., , and . ISSNIP, page 1-6. IEEE, (2014)