Author of the publication

A social-based watchdog system to detect selfish nodes in opportunistic mobile networks.

, , , , , and . Future Gener. Comput. Syst., (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Making Nodes Cooperative: A Secure Incentive Mechanism for Message Forwarding in DTNs., and . ICCCN, page 1-7. IEEE, (2013)On providing wormhole-attack-resistant localization using conflicting sets., , and . Wirel. Commun. Mob. Comput., 15 (15): 1865-1881 (2015)Double Attention-based Deformable Convolutional Network for Recommendation., , , , and . ICCC, page 1051-1056. IEEE, (2020)A Hybrid Cluster-Based Target Tracking Protocol for Wireless Sensor Networks., , , , and . Int. J. Distributed Sens. Networks, (2013)SACT: A New Model of Covert Communication Based on SDN., , , , and . Sensors, 20 (24): 7300 (2020)Probabilistic Coverage Constraint Task Assignment with Privacy Protection in Vehicular Crowdsensing., , , and . Sensors, 23 (18): 7798 (September 2023)From edge data to recommendation: A double attention-based deformable convolutional network., , , , , and . Peer-to-Peer Netw. Appl., 14 (6): 3984-3997 (2021)Semi-Direct Monocular Visual-Inertial Odometry Using Point and Line Features for IoV., , , , , and . ACM Trans. Internet Techn., 22 (1): 5:1-5:23 (2022)Efficient and Reliable Missing Tag Identification for Large-Scale RFID Systems With Unknown Tags., , and . IEEE Internet Things J., 4 (3): 736-748 (2017)Towards time-constrained task allocation in semi-opportunistic mobile crowdsensing., , , , , and . Ad Hoc Networks, (November 2023)