Author of the publication

Designing Secure and Dependable Mobile Sensing Mechanisms With Revenue Guarantees.

, , , and . IEEE Trans. Information Forensics and Security, 11 (1): 100-113 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Tang, Siyuan
add a person with the name Tang, Siyuan
 

Other publications of authors with the same name

A Heuristic Algorithm for Optimal Discrete Bandwidth Allocation in SDN Networks., , and . GLOBECOM, page 1-7. IEEE, (2015)Design of hospital beds center management information system based on HIS., , , , and . BIBM, page 1093-1096. IEEE Computer Society, (2017)Chain-Based DFA Deflation for Fast and Scalable Regular Expression Matching Using TCAM., , , and . ANCS, page 24-35. IEEE Computer Society, (2011)Designing Secure and Dependable Mobile Sensing Mechanisms With Revenue Guarantees., , , and . IEEE Trans. Information Forensics and Security, 11 (1): 100-113 (2016)Demo: Data Analysis and Visualization in Bike-Sharing Systems., , , , , , and . MobiSys (Companion Volume), page 128. ACM, (2016)Realizing video streaming multicast over SDN networks., , and . ChinaCom, page 90-95. IEEE, (2014)Design and development of ICU intelligent medicine management system based on MVC., , , and . BIBM, page 1023-1027. IEEE, (2016)Competitive auctions for cost-aware cellular traffic offloading with optimized capacity gain., , , and . INFOCOM, page 1-9. IEEE, (2016)Occupation exposure declaration and monitoring information system design and application for medical staff., , , and . BIBM, page 1409-1412. IEEE Computer Society, (2017)Cracking the Wall of Confinement: Understanding and Analyzing Malicious Domain Take-downs., , , , , , , , and . NDSS, The Internet Society, (2019)