Author of the publication

Game Theoretic Suppression of Forged Messages in Online Social Networks.

, , , , , , and . IEEE Trans. Syst. Man Cybern. Syst., 51 (3): 1601-1611 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Game Theoretic Suppression of Forged Messages in Online Social Networks., , , , , , and . IEEE Trans. Syst. Man Cybern. Syst., 51 (3): 1601-1611 (2021)Blockchain for Internet of Things., , , , and . Blockchains for Network Security, Institution of Engineering and Technology, (2020)A High-Performance Hybrid Blockchain System for Traceable IoT Applications., , , , , , and . NSS, volume 11928 of Lecture Notes in Computer Science, page 721-728. Springer, (2019)A Morphological LiDAR Points Cloud Filtering Method based on GPGPU., , , and . GISTAM, page 80-84. SciTePress, (2016)Enabling Attribute Revocation for Fine-Grained Access Control in Blockchain-IoT Systems., , , , , , , , and . IEEE Trans. Engineering Management, 67 (4): 1213-1230 (2020)Survey on blockchain for Internet of Things., , , , , , and . Comput. Commun., (2019)Collaborative Authentication in Decentralized Dense Mobile Networks With Key Predistribution., , , , and . IEEE Trans. Inf. Forensics Secur., 12 (10): 2261-2275 (2017)Anti-Pollution Source Location Privacy Preserving Scheme in Wireless Sensor Networks., , and . SECON, page 1-8. IEEE, (2016)An Optimized Round-Robin Scheduling of Speakers for Peers-to-Peers-Based Byzantine Faulty Tolerance., , , , and . GLOBECOM Workshops, page 1-6. IEEE, (2018)Analytic model on data security in VANETs., , , , , , and . ISCIT, page 1-6. IEEE, (2017)