Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deep Reinforcement Learning for Autonomous Internet of Things: Model, Applications and Challenges., , , , , and . IEEE Commun. Surv. Tutorials, 22 (3): 1722-1760 (2020)Leveraging Linear Quadratic Regulator Cost and Energy Consumption for Ultra-Reliable and Low-Latency IoT Control Systems., , , and . CoRR, (2020)A Lightweight Authentication Scheme for Cloud-Based RFID Healthcare Systems., , , , and . IEEE Netw., 33 (2): 44-49 (2019)Security and Privacy for Mobile Edge Caching: Challenges and Solutions., , and . CoRR, (2020)Intelligent Cache Pollution Attacks Detection for Edge Computing Enabled Mobile Social Networks., , , and . IEEE Trans. Emerg. Top. Comput. Intell., 4 (3): 241-252 (2020)P2AE: Preserving Privacy, Accuracy, and Efficiency in Location-Dependent Mobile Crowdsensing., , , and . IEEE Trans. Mob. Comput., 22 (4): 2323-2339 (April 2023)Exploiting Secure and Energy-Efficient Collaborative Spectrum Sensing for Cognitive Radio Sensor Networks., , , , , and . IEEE Trans. Wirel. Commun., 15 (10): 6813-6827 (2016)An AUV-Assisted Data Gathering Scheme Based on Clustering and Matrix Completion for Smart Ocean., , , , and . IEEE Internet Things J., 7 (10): 9904-9918 (2020)Vulnerability Analysis of Smart Contract for Blockchain-Based IoT Applications: A Machine Learning Approach., , , , and . IEEE Internet Things J., 9 (24): 24695-24707 (2022)Quantum-Safe Lattice-Based Certificateless Anonymous Authenticated Key Agreement for Internet of Things., , , , , and . IEEE Internet Things J., 11 (5): 9213-9225 (2024)