Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SNPL: One Scheme of Securing Nodes in IoT Perception Layer., , , , , , and . Sensors, 20 (4): 1090 (2020)Virtual Network Function Deployment Strategy in Clustered Multi-Mobile Edge Clouds., , , , and . WCNC, page 1-6. IEEE, (2020)A Security Scheme for Fog Computing Environment of IoT., , , , , , and . IoT S&P@CCS, page 58-59. ACM, (2019)Network Function Migration in Softwarization Based Networks with Mobile Edge Computing., , , , and . ICC, page 1-6. IEEE, (2020)Dynamic handoff policy for RAN slicing by exploiting deep reinforcement learning., , , and . EURASIP J. Wirel. Commun. Netw., 2021 (1): 61 (2021)Network Slice Selection in Softwarization Based Mobile Networks., , and . GLOBECOM, page 1-7. IEEE, (2018)One Secure IoT Scheme for Protection of True Nodes., , , , , and . SmartCom, volume 11344 of Lecture Notes in Computer Science, page 143-152. Springer, (2018)SBBS: A Secure Blockchain-Based Scheme for IoT Data Credibility in Fog Environment., , , , , , and . IEEE Internet Things J., 8 (11): 9268-9277 (2021)A Preliminary Design for Authenticity of IoT Big Data in Cloud Computing., , , , , and . ICCCN, page 1-2. IEEE, (2020)Network slice selection in softwarization-based mobile networks., , , and . Trans. Emerg. Telecommun. Technol., (2020)