Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BDTwins: Blockchain-based Digital Twins Lifecycle Management., , , , , and . SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta, page 2003-2010. IEEE, (2022)Detecting Malicious Behaviors in JavaScript Applications., , , , , , and . IEEE Access, (2018)Tokoin: A Coin-Based Accountable Access Control Scheme for Internet of Things., , , , , , , , , and . CoRR, (2020)Queuing Without Patience: A Novel Transaction Selection Mechanism in Blockchain for IoT Enhancement., , and . IEEE Internet Things J., 7 (9): 7941-7948 (2020)NormaChain: A Blockchain-Based Normalized Autonomous Transaction Settlement System for IoT-Based E-Commerce., , , , , and . IEEE Internet Things J., 6 (3): 4680-4693 (2019)Design of cloud computing task offloading algorithm based on dynamic multi-objective evolution., and . Future Gener. Comput. Syst., (2021)Inference attacks based on neural networks in social networks., , , , and . HotWeb, page 10:1-10:6. ACM, (2017)Personal Information Inference in Social Networks., , , , and . PAC, page 196-197. IEEE, (2017)Cryptographic algorithms for privacy-preserving online applications., , , , and . Math. Found. Comput., 1 (4): 311-330 (2018)A Combination of Host Overloading Detection and Virtual Machine Selection in Cloud Server Consolidation based on Learning Method., , and . CoRR, (2022)