Author of the publication

Trust architecture and reputation evaluation for internet of things.

, , , , and . J. Ambient Intell. Humaniz. Comput., 10 (8): 3099-3107 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hunting abnormal configurations for permission-sensitive role mining., , , , and . MILCOM, page 1004-1009. IEEE, (2016)A Cluster-Based Multilevel Security Model for Wireless Sensor Networks., , and . Intelligent Information Processing, volume 385 of IFIP Advances in Information and Communication Technology, page 320-330. Springer, (2012)Resolving Access Conflicts: An Auction-Based Incentive Approach., , , , and . MILCOM, page 1-6. IEEE, (2018)A bottom-up algorithm of vertical assembling concept lattices., , , and . IJDMB, 7 (3): 229-244 (2013)Network Security Analysis Method Taking into Account the Usage Information (Poster Abstract)., , and . RAID, volume 7462 of Lecture Notes in Computer Science, page 378-379. Springer, (2012)Attribute-Role-Based Hybrid Access Control in the Internet of Things., and . APWeb Workshophs, volume 8710 of Lecture Notes in Computer Science, page 333-343. Springer, (2014)Hierarchically defining Internet of Things security: From CIA to CACA., , , , and . IJDSN, (2020)Local differentially private frequency estimation based on learned sketches., , and . Inf. Sci., (November 2023)CDAML: a cluster-based domain adaptive meta-learning model for cross domain recommendation., , , and . World Wide Web (WWW), 26 (3): 989-1003 (May 2023)Partition-based differentially private synthetic data generation., , and . CoRR, (2023)