Author of the publication

Evaluating Reputation Management Schemes of Internet of Vehicles based on Evolutionary Game Theory.

, , , , , and . CoRR, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Block-DEF: A secure digital evidence framework using blockchain., , , , and . Inf. Sci., (2019)Quantifying AS-level routing policy changes., , , and . ICC, page 1148-1153. IEEE, (2014)Towards Privacy-Preserving Location Sharing over Mobile Online Social Networks., , and . IEICE Trans. Inf. Syst., 102-D (1): 133-146 (2019)Honeypot Identification in Softwarized Industrial Cyber-Physical Systems., , , , , and . IEEE Trans. Ind. Informatics, 17 (8): 5542-5551 (2021)Automatically Traceback RDP-Based Targeted Ransomware Attacks., , , , , and . Wirel. Commun. Mob. Comput., (2018)Detecting Smart Contract Project Anomalies in Metaverse., , , , , , , and . MetaCom, page 524-532. IEEE, (2023)A Location Privacy-Aware Method for kNN Query in Location Based Services., , , and . DSC, page 537-541. IEEE, (2018)Towards real-time route leak events detection., , , , and . ICC, page 7192-7197. IEEE, (2015)VAT: A Velocity-Aware Trajectory Privacy Preservation Scheme for IoT Searching., , and . ICCCS (2), volume 11064 of Lecture Notes in Computer Science, page 357-365. Springer, (2018)Service Hyperlink: Modeling and Reusing Partial Process Knowledge by Mining Event Dependencies among Sensor Data Services., , , , and . ICWS, page 902-905. IEEE, (2017)