Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Achieving Source Location Privacy and Network Lifetime Maximization Through Tree-Based Diversionary Routing in Wireless Sensor Networks., , , and . IEEE Access, (2014)Intelligent Aggregation Based on Content Routing Scheme for Cloud Computing., , , , , and . Symmetry, 9 (10): 221 (2017)A novel deep policy gradient action quantization for trusted collaborative computation in intelligent vehicle networks., , , , , and . Expert Syst. Appl., (July 2023)SIoTFog: Byzantine-resilient IoT fog networking., , , , and . Frontiers Inf. Technol. Electron. Eng., 19 (12): 1546-1557 (2018)Energy-Efficient Joint Task Offloading and Resource Allocation in OFDMA-Based Collaborative Edge Computing., , , and . IEEE Trans. Wirel. Commun., 21 (3): 1960-1972 (2022)Channel Resource Scheduling for Stringent Demand of Emergency Data Transmission in WBANs., , , , , and . IEEE Trans. Wirel. Commun., 20 (4): 2341-2352 (2021)MSDG: A novel green data gathering scheme for wireless sensor networks., , , , , and . Comput. Networks, (2018)A statistical approach to participant selection in location-based social networks for offline event marketing., , , and . Inf. Sci., (2019)PHACK: An Efficient Scheme for Selective Forwarding Attack Detection in WSNs., , , and . Sensors, 15 (12): 30942-30963 (2015)A Similarity Scenario-Based Recommendation Model With Small Disturbances for Unknown Items in Social Networks., , and . IEEE Access, (2016)