Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Aggregate MapReduce Data Block Placement Strategy for Wireless IoT Edge Nodes in Smart Grid., , , , , , , , and . Wireless Personal Communications, 106 (4): 2225-2236 (2019)Threats to critical infrastructure from AI and human intelligence., , , and . J. Supercomput., 74 (10): 4865-4866 (2018)A Physical Capture Resistant Authentication Scheme for the Internet of Drones., , , , , , and . IEEE Commun. Stand. Mag., 5 (4): 62-67 (2021)Software-Defined GPU-CPU Empowered Efficient Wireless Federated Learning With Embedding Communication Coding for Beyond 5G., , , , and . IEEE Open J. Commun. Soc., (2023)DITrust Chain: Towards Blockchain-Based Trust Models for Sustainable Healthcare IoT Systems., , , , , and . IEEE Access, (2020)A Review of NLIDB With Deep Learning: Findings, Challenges and Open Issues., , , , and . IEEE Access, (2022)Providing End-to-End Security Using Quantum Walks in IoT Networks., , , , , , , and . IEEE Access, (2020)Blockchain-Based Incentive Energy-Knowledge Trading in IoT: Joint Power Transfer and AI Design., , , , , and . IEEE Internet Things J., 9 (16): 14685-14698 (2022)Detecting Wake Lock Leaks in Android Apps Using Machine Learning., , , , and . IEEE Access, (2021)Integrating Blockchain and Deep Learning Into Extremely Resource-Constrained IoT: An Energy-Saving Zero-Knowledge PoL Approach., , , , and . IEEE Internet Things J., 11 (3): 3881-3895 (February 2024)