Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Degree-Constrained Adaptive Algorithm Based on the Data Aggregation Tree., , , and . IJDSN, (2014)UAVs joint vehicles as data mules for fast codes dissemination for edge networking in Smart City., , , and . Peer-to-Peer Netw. Appl., 12 (6): 1550-1574 (2019)Differentiated Data Aggregation Routing Scheme for Energy Conserving and Delay Sensitive Wireless Sensor Networks., , , , , , , and . Sensors, 18 (7): 2349 (2018)Bab: A novel algorithm for training clean model based on poisoned data., , , , and . SafeAI@AAAI, volume 3381 of CEUR Workshop Proceedings, CEUR-WS.org, (2023)An Exhaustive Resource Search Algorithm Based on Ping-Pang Mapping., , and . CSSE (3), page 116-120. IEEE Computer Society, (2008)978-0-7695-3336-0.A Game-Based Economic Model for Price Decision Making in Cyber-Physical-Social Systems., , , , , , , and . IEEE Access, (2019)Crowdsourcing Mechanism for Trust Evaluation in CPCS Based on Intelligent Mobile Edge Computing., , , and . ACM Trans. Intell. Syst. Technol., 10 (6): 62:1-62:19 (2019)Adaptive Contention Window MAC Protocol in a Global View for Emerging Trends Networks., , , and . IEEE Access, (2021)A CP-ABE scheme based on multi-authority in hybrid clouds for mobile devices., , , and . Future Gener. Comput. Syst., (2021)Data Security and Privacy in Fog Computing., , , and . IEEE Netw., 32 (5): 106-111 (2018)