Author of the publication

STSIR: An individual-group game-based model for disclosing virus spread in Social Internet of Things.

, , , , , and . J. Netw. Comput. Appl., (May 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Adaptive Multipath Algorithm to Overcome the Unpredictability of Heterogeneous Wireless Networks for High-Speed Railway., , , , , and . IEEE Trans. Veh. Technol., 67 (12): 11332-11344 (2018)NFLCS: An Service Function Chain Path Optimization Strategy Based on Network-Functional Layout Clustering., , , , , , and . IEEE Trans. Veh. Technol., 72 (8): 10813-10825 (August 2023)pFedSim: Similarity-Aware Model Aggregation Towards Personalized Federated Learning., , , , and . CoRR, (2023)IEEE Access Special Section Editorial: Security and Privacy in Emerging Decentralized Communication Environments., , , , and . IEEE Access, (2021)Multistage Signaling Game-Based Optimal Detection Strategies for Suppressing Malware Diffusion in Fog-Cloud-Based IoT Networks., , , , , and . IEEE Internet Things J., 5 (2): 1043-1054 (2018)Efficient Federated Learning for AIoT Applications Using Knowledge Distillation., , , , , and . IEEE Internet Things J., 10 (8, April 15): 7229-7243 (2023)Non-Line-of-Sight Localization of Passive UHF RFID Tags in Smart Storage Systems., , , , and . IEEE Trans. Mob. Comput., 21 (10): 3731-3743 (2022)Adaptive and Extensible Energy Supply Mechanism for UAVs-Aided Wireless-Powered Internet of Things., , , , and . IEEE Internet Things J., 7 (9): 9201-9213 (2020)Scalable and Updatable Attribute-based Privacy Protection Scheme for Big Data Publishing., , , , , and . GLOBECOM, page 1-6. IEEE, (2020)A DNS Tunneling Detection Method Based on Deep Learning Models to Prevent Data Exfiltration., , , and . NSS, volume 11928 of Lecture Notes in Computer Science, page 520-535. Springer, (2019)