Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Recurrent Learning Method Based on Received Signal Strength Analysis for Improving Wireless Sensor Localization., and . Circuits Syst. Signal Process., 39 (2): 1019-1037 (2020)BoDMaS: Bio-inspired Selfishness Detection and Mitigation in Data Management for Ad-hoc Social Networks., , , , , , and . Ad Hoc Networks, (2017)Internet of things-based urban waste management system for smart cities using a Cuckoo Search Algorithm., , , and . Clust. Comput., 23 (3): 1769-1780 (2020)Fuzzy-Enhanced Secure Messaging Framework for Smart Healthcare System., , , , , , , , and . IEEE Access, (2024)Efficient anomaly recognition using surveillance videos., , , , , and . PeerJ Comput. Sci., (2022)FedSL: A Communication-Efficient Federated Learning With Split Layer Aggregation., , , , , and . IEEE Internet Things J., 11 (9): 15587-15601 (May 2024)The Role of Positive and Negative Citations in Scientific Evaluation., , , , and . CoRR, (2020)Collaborative Team Recognition: A Core Plus Extension Structure., , , , , and . CoRR, (2024)DoS Attack Detection Based on Deep Factorization Machine in SDN., , , , , and . Comput. Syst. Sci. Eng., 45 (2): 1727-1742 (2023)Joint Data Offloading and Energy-Efficient Secure MEC Resource Allocation Method for IoT Device Data in RAN Communication., , , , , , , and . IEEE Trans. Green Commun. Netw., 8 (3): 1008-1017 (September 2024)