Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multipath Cooperative Routing with Efficient Acknowledgement for LEO Satellite Networks., , and . IEEE Trans. Mob. Comput., 18 (1): 179-192 (2019)Healing Multimodal Confident Information Coverage Holes in NB-IoT-Enabled Networks., , , and . IEEE Internet of Things Journal, 5 (3): 1463-1473 (2018)RMapTAFA: Radio Map Construction Based on Trajectory Adjustment and Fingerprint Amendment., , , and . IEEE Access, (2019)Secure Multimedia Big Data in Trust-Assisted Sensor-Cloud for Smart City., , , , , and . IEEE Communications Magazine, 55 (12): 24-30 (2017)An evaluation of user importance when integrating social networks and mobile cloud computing., , , , and . GLOBECOM, page 2935-2940. IEEE, (2014)Mend Barrier Gaps via Sensor Rotation for a Line-Based Deployed Directional Sensor Network., , , , and . HPCC/EUC, page 2074-2079. IEEE, (2013)Rechargeable router placement based on efficiency and fairness in green wireless mesh networks., , , and . Comput. Networks, (2015)A personalized hashtag recommendation approach using LDA-based topic model in microblog environment., , , and . Future Gener. Comput. Syst., (2016)Rich Mobile Applications: Genesis, taxonomy, and open issues., , , , and . J. Netw. Comput. Appl., (2014)Enhancing challenge-based collaborative intrusion detection networks against insider attacks using blockchain., , , and . Int. J. Inf. Sec., 19 (3): 279-290 (2020)