[go: up one dir, main page]

Follow
Sergio A. Salinas Monroy
Title
Cited by
Cited by
Year
Multi-objective computation sharing in energy and delay constrained mobile edge computing environments
A Bozorgchenani, F Mashhadi, D Tarchi, SAS Monroy
IEEE Transactions on Mobile Computing 20 (10), 2992-3005, 2020
2112020
Multi-objective optimal energy consumption scheduling in smart grids
S Salinas, M Li, P Li
IEEE Transactions on Smart Grid 4 (1), 341-348, 2012
1892012
Privacy-preserving energy theft detection in microgrids: A state estimation approach
SA Salinas, P Li
IEEE Transactions on Power Systems 31 (2), 883-894, 2015
1672015
Dynamic energy management for the smart grid with distributed energy resources
S Salinas, M Li, P Li, Y Fu
IEEE Transactions on Smart Grid 4 (4), 2139-2151, 2013
1622013
Privacy-preserving energy theft detection in smart grids: A P2P computing approach
S Salinas, M Li, P Li
IEEE Journal on Selected Areas in Communications 31 (9), 257-267, 2013
1282013
Efficient secure outsourcing of large-scale linear systems of equations
S Salinas, C Luo, X Chen, P Li
2015 IEEE Conference on Computer Communications (INFOCOM), 1035-1043, 2015
110*2015
Cascading Failure Attacks in the Power System: A Stochastic Game Perspective
W Liao, S Salinas, M Li, P Li, KA Loparo
IEEE Internet of Things Journal 4 (6), 2247-2259, 2017
892017
Privacy-preserving energy theft detection in smart grids
S Salinas, M Li, P Li
2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and …, 2012
652012
Efficient secure outsourcing of large-scale sparse linear systems of equations
S Salinas, C Luo, X Chen, W Liao, P Li
IEEE Transactions on Big Data 4 (1), 26-39, 2017
642017
Optimal scheduling for multi-radio multi-channel multi-hop cognitive cellular networks
M Li, S Salinas, P Li, X Huang, Y Fang, S Glisic
IEEE Transactions on Mobile Computing 14 (1), 139-154, 2014
642014
Mac-layer selfish misbehavior in ieee 802.11 ad hoc networks: Detection and defense
M Li, S Salinas, P Li, J Sun, X Huang
IEEE Transactions on Mobile Computing 14 (6), 1203-1217, 2015
542015
Optimal auction for delay and energy constrained task offloading in mobile edge computing
F Mashhadi, SAS Monroy, A Bozorgchenani, D Tarchi
Computer Networks 183, 107527, 2020
512020
Efficient Secure Outsourcing of Large-scale Quadratic Programs
S Salinas, C Luo, W Liao, P Li
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
392016
SecFact: Secure large-scale QR and LU factorizations
C Luo, K Zhang, S Salinas, P Li
IEEE Transactions on Big Data 7 (4), 796-807, 2017
382017
n-CD: A geometric approach to preserving location privacy in location-based services
M Li, S Salinas, A Thapa, P Li
INFOCOM, 2013 Proceedings IEEE, 3012-3020, 2013
382013
Efficient secure outsourcing of large-scale convex separable programming for big data
W Liao, C Luo, S Salinas, P Li
IEEE Transactions on Big Data 5 (3), 368-378, 2017
342017
Prevention and mitigation measures against phishing emails: a sequential schema model
YE Suzuki, SAS Monroy
Security Journal 35 (4), 1162, 2021
322021
A Tutorial on Secure Outsourcing of Large-scale Computations for Big Data
S Salinas, X Chen, J Ji, P Li
IEEE Access 4, 1406-1416, 2016
262016
State estimation for energy theft detection in microgrids
S Salinas, C Luo, W Liao, P Li
9th International Conference on Communications and Networking in China, 96-101, 2014
252014
Deep Learning for Optimal Resource Allocation in IoT-Enabled Additive Manufacturing
F Mashhadi, S Salinas Monroy
IEEE World Forum on Internet of Things, 2020
242020
The system can't perform the operation now. Try again later.
Articles 1–20