Author of the publication

Trustworthiness Inference Framework in the Social Internet of Things: A Context-Aware Approach.

, , , , and . INFOCOM, page 838-846. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Micro Analysis of Natural Forking in Blockchain Based on Large Deviation Theory., , , and . CoRR, (2021)Enabling smartphone-based HD video chats by cooperative transmissions in CRNs., , , , , and . EURASIP J. Wirel. Commun. Netw., (2015)Theme issue on advances in the Internet of Things: identification, information, and knowledge., , , and . Pers. Ubiquitous Comput., 19 (7): 985-987 (2015)Robust Compressive Data Gathering in Wireless Sensor Networks., , , , and . IEEE Trans. Wirel. Commun., 12 (6): 2754-2761 (2013)DCAP: Deep Cross Attentional Product Network for User Response Prediction., , , , , and . CIKM, page 221-230. ACM, (2021)zk-PCN: A Privacy-Preserving Payment Channel Network Using zk-SNARKs., , , , , and . IPCCC, page 57-64. IEEE, (2022)Approximate Optimization for Proportional Fair AP Association in Multi-rate WLANs., , , and . WASA, volume 6221 of Lecture Notes in Computer Science, page 36-46. Springer, (2010)Secure Authentication Scheme Using Dual Channels in Rogue Access Point Environments., , and . WASA, volume 8491 of Lecture Notes in Computer Science, page 554-563. Springer, (2014)An Empirical Study of the Framework Impact on the Security of JavaScript Web Applications., , and . WWW (Companion Volume), page 753-758. ACM, (2018)PPAR: A Privacy-Preserving Adaptive Ranking Algorithm for Multi-Armed-Bandit Crowdsourcing., , , , , and . IWQoS, page 1-10. IEEE, (2022)