Follow
Sergio A. Salinas Monroy
Title
Cited by
Cited by
Year
Multi-objective optimal energy consumption scheduling in smart grids
S Salinas, M Li, P Li
IEEE Transactions on Smart Grid 4 (1), 341-348, 2012
1652012
Dynamic energy management for the smart grid with distributed energy resources
S Salinas, M Li, P Li, Y Fu
IEEE Transactions on Smart Grid 4 (4), 2139-2151, 2013
1332013
Privacy-preserving energy theft detection in microgrids: A state estimation approach
SA Salinas, P Li
IEEE Transactions on Power Systems 31 (2), 883-894, 2015
1062015
Privacy-preserving energy theft detection in smart grids: A P2P computing approach
S Salinas, M Li, P Li
IEEE Journal on Selected Areas in Communications 31 (9), 257-267, 2013
992013
Efficient secure outsourcing of large-scale linear systems of equations
S Salinas, C Luo, X Chen, P Li
2015 IEEE Conference on Computer Communications (INFOCOM), 1035-1043, 2015
83*2015
Cascading Failure Attacks in the Power System: A Stochastic Game Perspective
W Liao, S Salinas, M Li, P Li, KA Loparo
IEEE Internet of Things Journal 4 (6), 2247-2259, 2017
652017
Optimal scheduling for multi-radio multi-channel multi-hop cognitive cellular networks
M Li, S Salinas, P Li, X Huang, Y Fang, S Glisic
IEEE Transactions on Mobile Computing 14 (1), 139-154, 2014
612014
Multi-Objective Computation Sharing in Energy and Delay Constrained Mobile Edge Computing Environments
A Bozorgchenani, F Mashhadi, D Tarchi, SS Monroy
IEEE Transactions on Mobile Computing, 2020
572020
Privacy-preserving energy theft detection in smart grids
S Salinas, M Li, P Li
2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and …, 2012
572012
Efficient secure outsourcing of large-scale sparse linear systems of equations
S Salinas, C Luo, X Chen, W Liao, P Li
IEEE Transactions on Big Data 4 (1), 26-39, 2017
492017
Mac-layer selfish misbehavior in ieee 802.11 ad hoc networks: Detection and defense
M Li, S Salinas, P Li, J Sun, X Huang
IEEE Transactions on Mobile Computing 14 (6), 1203-1217, 2015
482015
n-CD: A geometric approach to preserving location privacy in location-based services
M Li, S Salinas, A Thapa, P Li
INFOCOM, 2013 Proceedings IEEE, 3012-3020, 2013
332013
Efficient Secure Outsourcing of Large-scale Quadratic Programs
S Salinas, C Luo, W Liao, P Li
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
312016
Optimal auction for delay and energy constrained task offloading in mobile edge computing
F Mashhadi, SAS Monroy, A Bozorgchenani, D Tarchi
Computer Networks 183, 107527, 2020
262020
A Tutorial on Secure Outsourcing of Large-scale Computations for Big Data
S Salinas, X Chen, J Ji, P Li
IEEE Access 4, 1406-1416, 2016
262016
SecFact: Secure Large-scale QR and LU Factorizations
C Luo, K Zhang, S Salinas, P Li
IEEE Transactions on Big Data, 2017
242017
Efficient Secure Outsourcing of Large-scale Convex Separable Programming for Big Data
W Liao, C Luo, S Salinas, P Li
IEEE Transactions on Big Data, 2017
212017
Asymmetric social proximity based private matching protocols for online social networks
A Thapa, M Li, S Salinas, P Li
IEEE Transactions on Parallel and Distributed Systems 26 (6), 1547-1559, 2015
182015
State estimation for energy theft detection in microgrids
S Salinas, C Luo, W Liao, P Li
9th International Conference on Communications and Networking in China, 96-101, 2014
172014
Efficient privacy-preserving outsourcing of large-scale QR factorization
C Luo, K Zhang, S Salinas, P Li
2017 IEEE Trustcom/BigDataSE/ICESS, 917-924, 2017
152017
The system can't perform the operation now. Try again later.
Articles 1–20