Author of the publication

Collusion Attack Detection in Networked Systems.

, and . DASC/PiCom/DataCom/CyberSciTech, page 286-293. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deploying Wireless Sensor Networks with Fault-Tolerance for Structural Health Monitoring., , , and . IEEE Trans. Computers, 64 (2): 382-395 (2015)Understanding Graph-Based Trust Evaluation in Online Social Networks: Methodologies and Challenges., , , and . ACM Comput. Surv., 49 (1): 10:1-10:35 (2016)Offline Sketch Parsing via Shapeness Estimation., , , and . IJCAI, page 1200-1207. AAAI Press, (2015)Trustworthy and protected data collection for event detection using networked sensing systems., and . Sarnoff Symposium, page 148-153. IEEE, (2016)Multi-round Bidding Strategy Based on Game Theory for Crowdsensing Task., , , and . SpaCCS, volume 11611 of Lecture Notes in Computer Science, page 196-210. Springer, (2019)2-Dominant Resource Fairness: Fairness-Efficiency Tradeoffs in Multi-resource Allocation., and . IPCCC, page 1-8. IEEE, (2018)A joint replication-migration-based routing in delay tolerant networks., , , and . ICC, page 73-77. IEEE, (2012)MARDO: A novel schema of dynamic QoS optimizing for composite web services using cooperative agents., , , and . CSCWD, page 408-412. IEEE, (2010)Mobility Management and Its Applications in Efficient Broadcasting in Mobile Ad Hoc Networks., and . INFOCOM, IEEE, (2004)Optimizing Rebalance Scheme for Dock-Less Bike Sharing Systems with Adaptive User Incentive., and . MDM, page 176-181. IEEE, (2019)