Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Empirical Study on Retinex Methods for Low-Light Image Enhancement., , , , and . Remote. Sens., 14 (18): 4608 (2022)Task bundling in worker-centric mobile crowdsensing., , , , and . Int. J. Intell. Syst., 36 (9): 4936-4961 (2021)Trust-Driven and PSO-SFLA based job scheduling algorithm on Cloud., , , , and . Intell. Autom. Soft Comput., 22 (4): 561-566 (2016)An Authentication Scheme to Defend Against UDP DrDoS Attacks in 5G Networks., , , and . IEEE Access, (2019)A Sparse Bayesian Learning Method for Structural Equation Model-Based Gene Regulatory Network Inference., , , , , and . IEEE Access, (2020)IEEE Access Special Section Editorial: Security and Privacy in Emerging Decentralized Communication Environments., , , , and . IEEE Access, (2021)Prediction of IIoT traffic using a modified whale optimization approach integrated with random forest classifier., , , , , and . J. Supercomput., 78 (8): 10725-10756 (2022)Efficient and Fine-Grained Signature for IIoT With Resistance to Key Exposure., , and . IEEE Internet Things J., 8 (11): 9189-9205 (2021)Micro-Distortion Detection of Lidar Scanning Signals Based on Geometric Analysis., , , and . Symmetry, 11 (12): 1471 (2019)Imbalanced big data classification based on virtual reality in cloud computing., and . Multim. Tools Appl., 79 (23-24): 16403-16420 (2020)