Author of the publication

A Scalable Sharding Protocol Based on Cross-Shard Dynamic Transaction Confirmation for Alliance Chain in Intelligent Systems.

, , , and . Int. J. Semantic Web Inf. Syst., 19 (1): 1-30 (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive and Convex Optimization-Inspired Workflow Scheduling for Cloud Environment., , , , , , and . Int. J. Cloud Appl. Comput., 13 (1): 1-25 (2023)Digital Watermarking-Based Cryptosystem for Cloud Resource Provisioning., , , , , , , , and . Int. J. Cloud Appl. Comput., 12 (1): 1-20 (2022)Mobile Cloud Computing and Sustainable Development: Opportunities, Challenges, and Future Directions., , , , , , and . Int. J. Cloud Appl. Comput., 12 (1): 1-20 (2022)A novel Cumulative Indicator score using Indicator averaging for optimizing local business websites of enterprise systems., , , , , , and . Enterp. Inf. Syst., (February 2024)Analysis of cutting-edge technologies for enterprise information system and management., , , and . Enterp. Inf. Syst., (November 2023)A Survey of Internet of Things and Cyber-Physical Systems: Standards, Algorithms, Applications, Security, Challenges, and Future Directions., , , , , , and . Inf., 14 (7): 388 (2023)Secure authentication and privacy-preserving blockchain for industrial internet of things., , , , , and . Comput. Electr. Eng., (May 2023)Detection of Distributed Denial of Service (DDoS) Attacks Using Computational Intelligence and Majority Vote-Based Ensemble Approach., , , , and . Int. J. Softw. Sci. Comput. Intell., 14 (1): 1-10 (2022)Deep Learning Based Hate Speech Detection on Twitter., , , , and . ICCE-Berlin, page 1-6. IEEE, (2023)Detection of Malicious Node in VANETs Using Digital Twin., , , , and . DataCom, volume 13864 of Lecture Notes in Computer Science, page 204-212. Springer, (2022)