Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Nearly-Unsupervised Hashcode Representations for Relation Extraction., , , and . CoRR, (2019)Fuzzy-Folded Bloom Filter-as-a-Service for Big Data Storage in the Cloud., , , , , and . IEEE Trans. Ind. Informatics, 15 (4): 2338-2348 (2019)Secure and Lightweight Authentication Scheme for Smart Metering Infrastructure in Smart Grid., , , , and . IEEE Trans. Ind. Informatics, 16 (5): 3548-3557 (2020)A Lightweight and Privacy-Preserving Authentication Protocol for Mobile Edge Computing., , , , and . GLOBECOM, page 1-6. IEEE, (2019)A Blockchain-Based Framework for Lightweight Data Sharing and Energy Trading in V2G Network., , , , , and . IEEE Trans. Veh. Technol., 69 (6): 5799-5812 (2020)Toward Secure and Provable Authentication for Internet of Things: Realizing Industry 4.0., , , and . IEEE Internet Things J., 7 (5): 4598-4606 (2020)ECC-based Secure and Provable Authentication Mechanism for Smart Healthcare Ecosystem., , , and . ICC, page 1-6. IEEE, (2020)An Adaptive Grid Frequency Support Mechanism for Energy Management in Cloud Data Centers., , , , , and . IEEE Syst. J., 14 (1): 1195-1205 (2020)Embedding Security Awareness for Virtual Resource Allocation in 5G Hetnets Using Reinforcement Learning., , , , and . IEEE Commun. Stand. Mag., 5 (2): 20-27 (2021)Learning Non-Stationary Space-Time Models for Environmental Monitoring., , and . CoRR, (2018)