Author of the publication

Energy Efficient Data Collection in Large-Scale Internet of Things via Computation Offloading.

, , , , , , and . IEEE Internet Things J., 6 (3): 4176-4187 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EMAP: An efficient mutual authentication protocol for passive RFID tags., , , and . Int. J. Autom. Comput., 9 (1): 108-112 (2012)Modeling on virtual network embedding using reinforcement learning., , , , , , , and . Concurr. Comput. Pract. Exp., (2020)A DPSO-Based Load Balancing Virtual Network Embedding Algorithm with Particle Initialization Strategy., , , , and . ICSI (2), volume 9713 of Lecture Notes in Computer Science, page 306-313. Springer, (2016)A Key Management Scheme Combined with Intrusion Detection for Mobile Ad Hoc Networks., , , , and . KES-AMSTA, volume 4953 of Lecture Notes in Computer Science, page 584-593. Springer, (2008)On-line Calibration of Semiconductor Gas Sensors Based on Prediction Model., , , , , and . J. Comput., 8 (9): 2204-2208 (2013)Secure Multiple Deployment in Wireless Sensor Networks., , and . MobiQuitous, page 1-4. IEEE Computer Society, (2007)Differential Kullback-Leibler Divergence Based Anomaly Detection Scheme in Sensor Networks., and . CIT, page 966-970. IEEE Computer Society, (2012)Application on Information Island with Information Visualization and Software Engineering., , , , and . ICSAI, page 598-603. IEEE, (2018)A sequential mesh test based selective forwarding attack detection scheme in wireless sensor networks., , and . ICNSC, page 554-558. IEEE, (2010)Mutual Authentication in Wireless Mesh Networks., , , and . ICC, page 1690-1694. IEEE, (2008)