Author of the publication

A decentralized and reliable trust measurement for edge computing enabled Internet of Things.

, , and . Concurr. Comput. Pract. Exp., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anti-conspiracy attack threshold signature model and protocol., , , and . Int. J. Wirel. Mob. Comput., 17 (3): 300-306 (2019)Trusted connection architecture of Internet of Things oriented to perception layer., , , , , and . Int. J. Wirel. Mob. Comput., 12 (3): 224-231 (2017)An Efficient Malicious Code Detection System Based on Convolutional Neural Networks., , , , , and . CSAI/ICIMT, page 86-89. ACM, (2018)Research on CLPKC-IDPKC cross-domain identity authentication for IoT environment., , and . Comput. Commun., (2020)A Many-Objective Multistage Optimization-Based Fuzzy Decision-Making Model for Coal Production Prediction., , , , and . IEEE Trans. Fuzzy Syst., 29 (12): 3665-3675 (2021)Trusted data collection for Internet of Things., , , and . Concurr. Comput. Pract. Exp., (2021)A decentralized and reliable trust measurement for edge computing enabled Internet of Things., , and . Concurr. Comput. Pract. Exp., (2022)Fast identification method of malicious code based on extreme learning machine., , , and . ICSCA, page 55-60. ACM, (2022)Character-level domain name generation algorithm based on ED-GAN., , , and . ICSCA, page 198-205. ACM, (2022)Hierarchy Merkle tree wireless sensor network architecture., , , , , and . Int. J. Wirel. Mob. Comput., 12 (4): 341-348 (2017)