Author:
Yao Xin,Zou Yizhu,Chen Zhigang,Zhao Ming,Liu Qin
Funder
Natural Science Foundation of Hunan Provincial
National Natural Science Foundation of China
Subject
Artificial Intelligence,Computer Networks and Communications,Hardware and Architecture,Theoretical Computer Science,Software
Reference42 articles.
1. Space/time trade-offs in hash coding with allowable errors;Bloom;Commun. ACM,2019
2. Workload scheduling toward worst-case delay and optimal utility for single-hop fog-iot architecture;Deng;IET Commun.,2018
3. Authentic data publication over the internet;Devanbu;J. Comput. Secur.,2003
4. Spatial query integrity with voronoi neighbors;Hu;IEEE Trans. Knowl. Data Eng.,2013
5. T. Li, Y. Chen, J. Sun, X. Jin, Y. Zhang, iLock: immediate and automatic locking of mobile devices against data theft, in CCS’16, Vienna, Austria, 2016.
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献