Author of the publication

Differentially Private Event Sequences over Infinite Streams with Relaxed Privacy Guarantee.

, , , , , and . WASA, volume 11604 of Lecture Notes in Computer Science, page 272-284. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using social network theory for modeling human mobility., , , and . IEEE Network, 24 (5): 6-13 (2010)Differentially Private Event Sequences over Infinite Streams with Relaxed Privacy Guarantee., , , , , and . WASA, volume 11604 of Lecture Notes in Computer Science, page 272-284. Springer, (2019)Energy-Balanced Backpressure Routing for Stochastic Energy Harvesting WSNs., , , and . WASA, volume 9204 of Lecture Notes in Computer Science, page 767-777. Springer, (2015)BOR/AC: Bandwidth-aware opportunistic routing with admission control in wireless mesh networks., , , , and . INFOCOM, page 2701-2705. IEEE, (2012)Buffer Data-Driven Adaptation of Mobile Video Streaming Over Heterogeneous Wireless Networks., , , , and . IEEE Internet of Things Journal, 5 (5): 3430-3441 (2018)On Minimizing Energy Cost in Internet-Scale Systems With Dynamic Data., , , , and . IEEE Access, (2017)HLLS: A History Information Based Light Location Service for MANETs., , , and . ICC, page 1-5. IEEE, (2010)A Novel En-Route Filtering Scheme Against False Data Injection Attacks in Cyber-Physical Networked Systems., , , , , and . IEEE Trans. Computers, 64 (1): 4-18 (2015)Network coding versus traditional routing in adversarial wireless networks., , , and . Ad Hoc Networks, (2014)A Cross-Layer Approach Handling Link Asymmetry for Wireless Mesh Access Networks., , , , and . IEEE Trans. Vehicular Technology, 60 (3): 1045-1058 (2011)