Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An IoT and Edge Computing Based Framework for Charge Scheduling and EV Selection in V2G Systems., , , , and . IEEE Trans. Veh. Technol., 69 (10): 10569-10580 (2020)A testbed validated simple time synchronization protocol for clustered wireless sensor networks for IoT., , and . J. Intell. Fuzzy Syst., 36 (5): 4531-4543 (2019)A Blockchain-Based Framework for Lightweight Data Sharing and Energy Trading in V2G Network., , , , , and . IEEE Trans. Veh. Technol., 69 (6): 5799-5812 (2020)A Parking Slot Allocation Framework Based on Virtual Voting and Adaptive Pricing Algorithm., , , and . IEEE Trans. Veh. Technol., 69 (6): 5945-5957 (2020)Latency aware mobile task assignment and load balancing for edge cloudlets., , and . PerCom Workshops, page 587-592. IEEE, (2017)Computation Offloading for Vehicular Environments: A Survey., , , , , , , , and . IEEE Access, (2020)Interpreting Black-Box Models: A Review on Explainable Artificial Intelligence., , , , , , , , , and . Cogn. Comput., 16 (1): 45-74 (January 2024)Machine Un-learning: An Overview of Techniques, Applications, and Future Directions., , , , , , , and . Cogn. Comput., 16 (2): 482-506 (March 2024)Edge Computing and Deep Learning Enabled Secure Multitier Network for Internet of Vehicles., , , , and . IEEE Internet Things J., 8 (19): 14787-14796 (2021)A Comprehensive Review of Unmanned Aerial Vehicle Attacks and Neutralization Techniques., , , , , and . Ad Hoc Networks, (2021)