Author of the publication

Energy Efficient Data Collection in Large-Scale Internet of Things via Computation Offloading.

, , , , , , and . IEEE Internet Things J., 6 (3): 4176-4187 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Virtual network embedding with pre-transformation and incentive convergence mechanism., , , , , and . Concurr. Comput. Pract. Exp., (2017)A PSO-Based Virtual Network Mapping Algorithm with Crossover Operator., , , , , and . SmartCom, volume 10135 of Lecture Notes in Computer Science, page 527-536. Springer, (2016)Modeling on Energy-Efficiency Computation Offloading Using Probabilistic Action Generating., , , , , and . IEEE Internet Things J., 9 (20): 20681-20692 (2022)Influence analysis in social networks: A survey., , , , , and . J. Netw. Comput. Appl., (2018)Aspect-level sentiment analysis using context and aspect memory network., , , , , , and . Neurocomputing, (2021)Co-attention Networks for Aspect-Level Sentiment Analysis., , , , and . NLPCC (2), volume 11839 of Lecture Notes in Computer Science, page 200-209. Springer, (2019)Trusted Routing Based on Dynamic Trust Mechanism in Mobile Ad-Hoc Networks., , , , and . IEICE Trans. Inf. Syst., 93-D (3): 510-517 (2010)New deep learning method to detect code injection attacks on hybrid applications., , , , and . J. Syst. Softw., (2018)A Collaborative Data Collection Scheme Based on Optimal Clustering for Wireless Sensor Networks., , , , , , and . Sensors, 18 (8): 2487 (2018)Propagation model of smartphone worms based on semi-Markov process and social relationship graph., , , and . Comput. Secur., (2014)