Author of the publication

Blockchain-Enhanced Fair Task Scheduling for Cloud-Fog-Edge Coordination Environments: Model and Algorithm.

, , , , and . Secur. Commun. Networks, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Effective Trust-Based Packet Filtering in Collaborative Network Environments., , and . IEEE Trans. Netw. Serv. Manag., 14 (1): 233-245 (2017)DCUS: Evaluating Double-Click-Based Unlocking Scheme on Smartphones., , , and . Mob. Networks Appl., 27 (1): 382-391 (2022)Learning from Imperfect Demonstrations through Dynamics Evaluation., , , , and . CoRR, (2023)Enhancing collaborative intrusion detection via disagreement-based semi-supervised learning in IoT environments., , and . J. Netw. Comput. Appl., (2020)A collaborative filtering recommendation method based on discrete quantum-inspired shuffled frog leaping algorithms in social networks., , , , and . Future Gener. Comput. Syst., (2018)Designing collaborative blockchained signature-based intrusion detection in IoT environments., , , and . Future Gener. Comput. Syst., (2019)Blockchain-Enhanced Fair Task Scheduling for Cloud-Fog-Edge Coordination Environments: Model and Algorithm., , , , and . Secur. Commun. Networks, (2021)Recognition algorithm of athletes' partially occluded face based on a deep learning algorithm., and . Int. J. Biom., 13 (2/3): 305-321 (2021)MVPSys: Toward practical multi-view based false alarm reduction system in network intrusion detection., , , and . Comput. Secur., (2016)Toward supervised shape-based behavioral authentication on smartphones., , , and . J. Inf. Secur. Appl., (2020)