I agree that this site is using cookies. You can find further informations
here
.
X
Login
My folder (
0
)
Home
About us
Home About us
Our history
Profile
Press & public relations
Friends
The library in figures
Exhibitions
Projects
Training, internships, careers
Films
Services & Information
Home Services & Information
Lending and interlibrary loans
Returns and renewals
Training and library tours
My Account
Library cards
New to the library?
Download Information
Opening hours
Learning spaces
PC, WLAN, copy, scan and print
Catalogs and collections
Home Catalogs and Collections
Rare books and manuscripts
Digital collections
Subject Areas
Our sites
Home Our sites
Central Library
Law Library (Juridicum)
BB Business and Economics (BB11)
BB Physics and Electrical Engineering
TB Engineering and Social Sciences
TB Economics and Nautical Sciences
TB Music
TB Art & Design
TB Bremerhaven
Contact the library
Home Contact the library
Staff Directory
Open access & publishing
Home Open access & publishing
Reference management: Citavi & RefWorks
Publishing documents
Open Access in Bremen
Show Desktop-Version
Toggle navigation
LI, Zhetao
266
results:
Search for persons
X
Format
Online (266)
Mediatypes
Articles (Online) (182)
Bookchapter (Online) (14)
OpenAccess-fulltext (70)
Languages
english (170)
Sorted by: Relevance
Sorted by: Year
?
1
Reliability-Aware VNF Provisioning in Homogeneous and Heter..:
, In:
Algorithms and Architectures for Parallel Processing; Lecture Notes in Computer Science
,
Liu, Haolin
;
Tan, Zehang
;
Li, Zhetao
... - p. 147-167 , 2024
Link:
https://doi.org/10.1007/..
?
2
A Threshold-based Binary Message Passing Decoder with Memor..:
Zhao, Xinwei
;
Zhao, Shancheng
;
Deng, Qingyong
..
IEEE Transactions on Communications. , 2024
Link:
https://doi.org/10.1109/..
?
3
AnotherMe: A Location Privacy Protection System based on On..:
Li, Yuanfei
;
Li, Xiong
;
Luo, Xiangyang
...
IEEE Transactions on Dependable and Secure Computing. , 2024
Link:
https://doi.org/10.1109/..
?
4
Q-BLPP: A Quality-Enabled Bilateral Location Privacy-Preser..:
Tang, Jianheng
;
Cai, Yishuo
;
Long, Saiqin
...
IEEE Transactions on Services Computing. , 2024
Link:
https://doi.org/10.1109/..
?
5
MGAP3: Malware Group Attribution Based on PerceiverIO and P..:
Sun, Yuxia
;
Chen, Shiqi
;
Lin, Song
...
IEEE Transactions on Dependable and Secure Computing. , 2024
Link:
https://doi.org/10.1109/..
?
6
A UAV-Assisted Truth Discovery Approach With Incentive Mech..:
Wang, Ping
;
Li, Zhetao
;
Guo, Bin
...
IEEE/ACM Transactions on Networking. 32 (2024) 2 - p. 1738-1752 , 2024
Link:
https://doi.org/10.1109/..
?
7
Location and Bid Privacy Preserving-Based Quality-Aware Wor..:
Shi, Weifan
;
Deng, Qingyong
;
Li, Zhetao
...
IEEE Internet of Things Journal. 11 (2024) 12 - p. 21841-21856 , 2024
Link:
https://doi.org/10.1109/..
?
8
Score-based Counterfactual Generation for Interpretable Med..:
Wang, Ke
;
Chen, Zicong
;
Zhu, Mingjia
...
IEEE Transactions on Medical Imaging. , 2024
Link:
https://doi.org/10.1109/..
?
9
Enhancing Sparse Mobile CrowdSensing With Manifold Optimiza..:
Li, Chengxin
;
Long, Saiqin
;
Liu, Haolin
...
IEEE Transactions on Information Forensics and Security. 19 (2024) - p. 6070-6083 , 2024
Link:
https://doi.org/10.1109/..
?
10
A Proactive Trust Evaluation System for Secure Data Collect..:
Huang, Mingfeng
;
Li, Zhetao
;
Liu, Anfeng
...
IEEE Transactions on Dependable and Secure Computing. , 2024
Link:
https://doi.org/10.1109/..
?
11
DNN acceleration in vehicle edge computing with mobility-aw..:
Zheng, Yuxin
;
Cui, Lin
;
Tso, Fung Po
..
Computer Networks. 251 (2024) - p. 110607 , 2024
Link:
https://doi.org/10.1016/..
?
12
Group Task Recommendation in Mobile Crowdsensing: An Attent..:
Wei, Kaimin
;
Qi, Guozi
;
Li, Zhetao
..
IEEE Transactions on Mobile Computing. 23 (2024) 8 - p. 8066-8076 , 2024
Link:
https://doi.org/10.1109/..
?
13
Time-Varying Resource Graph Based Processing on the Way for..:
Chen, Long
;
Tang, Feilong
;
Liu, Jiacheng
...
IEEE Transactions on Mobile Computing. 23 (2024) 2 - p. 1985-2002 , 2024
Link:
https://doi.org/10.1109/..
?
14
Data Poisoning Attacks and Defenses to LDP-based Privacy-Pr..:
Zheng, Zhirun
;
Li, Zhetao
;
Huang, Cheng
...
IEEE Transactions on Dependable and Secure Computing. , 2024
Link:
https://doi.org/10.1109/..
?
15
Privacy Leakage from Dynamic Prices: Trip Purpose Mining as..:
Guo, Suiming
;
Chen, Chao
;
Li, Zhetao
...
IEEE Transactions on Mobile Computing. , 2024
Link:
https://doi.org/10.1109/..
1-15