Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enabling Trusted and Privacy-Preserving Healthcare Services in Social Media Health Networks., , and . IEEE Trans. Multimedia, 21 (3): 579-590 (2019)Joint Channel Access and Sampling Rate Control in Energy Harvesting Cognitive Radio Sensor Networks., , , , , and . IEEE Trans. Emerging Topics Comput., 7 (1): 149-161 (2019)Toward Efficient Transparent Computing for IoT Apps by On-Chip Kernel Offload., and . IEEE Internet of Things Journal, 6 (3): 4085-4097 (2019)EdgeSanitizer: Locally Differentially Private Deep Inference at the Edge for Mobile Data Analytics., , , , , and . IEEE Internet of Things Journal, 6 (3): 5140-5151 (2019)Delay-Optimal Proactive Service Framework for Block-Stream as a Service., , , and . IEEE Wireless Commun. Letters, 7 (4): 598-601 (2018)Classification of Hand Movements from EEG using a Deep Attention-based LSTM Network., , , , and . CoRR, (2019)Outage Performance for Secure Communication over Correlated Fading Channels with Partial CSI., , , , , and . APSCC, page 257-262. IEEE Computer Society, (2012)A Joint Web Resource Recommendation Method based on Category Tree and Associate Graph., , , , , and . J. UCS, 15 (12): 2387-2408 (2009)Analysis on the Scheduling Problem in Transparent Computing., , and . HPCC/EUC, page 1832-1837. IEEE, (2013)Energy-efficient packet transmission with unidirectional-valve scheduling., , , , and . IET Communications, 9 (9): 1248-1257 (2015)