LI, Zhetao
266  results:
Search for persons X
?
1

Reliability-Aware VNF Provisioning in Homogeneous and Heter..:

, In: Algorithms and Architectures for Parallel Processing; Lecture Notes in Computer Science,
Liu, Haolin ; Tan, Zehang ; Li, Zhetao... - p. 147-167 , 2024
 
?
3

AnotherMe: A Location Privacy Protection System based on On..:

Li, Yuanfei ; Li, Xiong ; Luo, Xiangyang...
IEEE Transactions on Dependable and Secure Computing.  , 2024
 
?
5

MGAP3: Malware Group Attribution Based on PerceiverIO and P..:

Sun, Yuxia ; Chen, Shiqi ; Lin, Song...
IEEE Transactions on Dependable and Secure Computing.  , 2024
 
?
6

A UAV-Assisted Truth Discovery Approach With Incentive Mech..:

Wang, Ping ; Li, Zhetao ; Guo, Bin...
IEEE/ACM Transactions on Networking.  32 (2024)  2 - p. 1738-1752 , 2024
 
?
7

Location and Bid Privacy Preserving-Based Quality-Aware Wor..:

Shi, Weifan ; Deng, Qingyong ; Li, Zhetao...
IEEE Internet of Things Journal.  11 (2024)  12 - p. 21841-21856 , 2024
 
?
9

Enhancing Sparse Mobile CrowdSensing With Manifold Optimiza..:

Li, Chengxin ; Long, Saiqin ; Liu, Haolin...
IEEE Transactions on Information Forensics and Security.  19 (2024)  - p. 6070-6083 , 2024
 
?
 
?
12

Group Task Recommendation in Mobile Crowdsensing: An Attent..:

Wei, Kaimin ; Qi, Guozi ; Li, Zhetao..
IEEE Transactions on Mobile Computing.  23 (2024)  8 - p. 8066-8076 , 2024
 
?
13

Time-Varying Resource Graph Based Processing on the Way for..:

Chen, Long ; Tang, Feilong ; Liu, Jiacheng...
IEEE Transactions on Mobile Computing.  23 (2024)  2 - p. 1985-2002 , 2024
 
?
14

Data Poisoning Attacks and Defenses to LDP-based Privacy-Pr..:

Zheng, Zhirun ; Li, Zhetao ; Huang, Cheng...
IEEE Transactions on Dependable and Secure Computing.  , 2024
 
1-15