Author of the publication

A trust model based on fuzzy recommendation for mobile ad-hoc networks.

, , and . Comput. Networks, 53 (14): 2396-2407 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Distance-Aware Replica Adaptive Data Gathering Protocol for Delay Tolerant Mobile Sensor Networks., , , , and . Sensors, 11 (4): 4104-4117 (2011)A trust model based on fuzzy recommendation for mobile ad-hoc networks., , and . Comput. Networks, 53 (14): 2396-2407 (2009)Semantic Segmentation of Remote Sensing Images Using Multiscale Decoding Network., , , , and . IEEE Geosci. Remote. Sens. Lett., 16 (9): 1492-1496 (2019)CSR: Cascade Conditional Variational Auto Encoder with Socially-aware Regression for Pedestrian Trajectory Prediction., , , , and . Pattern Recognit., (2023)Search for Image Steganographic Policy With Adversary and Auxiliary Constrained Distance Measure., , and . IEEE Access, (2023)A Method to Improve the Privacy and Security for Federated Learning., and . ICCCS, page 704-708. IEEE, (2021)GANMIA: GAN-based Black-box Membership Inference Attack., , , and . ICC, page 1-6. IEEE, (2021)An efficient approach to detect distributed denial of service attacks for software defined internet of things combining autoencoder and extreme gradient boosting with feature selection and hyperparameter tuning optimization., , and . Trans. Emerg. Telecommun. Technol., (September 2023)Robust Path Planner for Autonomous Vehicles on Roads With Large Curvature., , , , , and . IEEE Robotics Autom. Lett., 7 (2): 2503-2510 (2022)A Defense Framework for Privacy Risks in Remote Machine Learning Service., , , and . Secur. Commun. Networks, (2021)