Author of the publication

Edge Computing in Industrial Internet of Things: Architecture, Advances and Challenges.

, , , , , and . IEEE Commun. Surv. Tutorials, 22 (4): 2462-2488 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluation of the Route Optimization for NEMO in Satellite Networks., , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2 (2): 46-66 (2011)A Robust Hough Transform Technique for Complete Line Segment Description., and . Real Time Imaging, 1 (6): 419-426 (1995)Congestion Control for Interactive Video-on-Demand over ATM., and . Real Time Imaging, 5 (5): 315-328 (1999)A Covert Jamming Scheme Against an Intelligent Eavesdropper in Cooperative Cognitive Radio Networks., , , , , , , , and . IEEE Trans. Veh. Technol., 72 (10): 13243-13254 (October 2023)Multi-objective optimisation for selective packet discarding in wireless sensor network., , and . IET Wirel. Sens. Syst., 5 (3): 124-136 (2015)Traffic management of multimedia over ATM networks., and . IEEE Commun. Mag., 37 (1): 33-38 (1999)PrivacyProtector: Privacy-Protected Patient Data Collection in IoT-Based Healthcare Systems., , , , , and . IEEE Commun. Mag., 56 (2): 163-168 (2018)Real-time Secure Health Surveillance for Smarter Health Communities., , , and . IEEE Commun. Mag., 57 (1): 122-129 (2019)A Cost Analysis Framework for NEMO Prefix Delegation-Based Schemes., , and . IEEE Trans. Mob. Comput., 11 (7): 1192-1206 (2012)Special issue on new advanced techniques in security of artificial intelligence., , and . J. Ambient Intell. Humaniz. Comput., 13 (3): 1255-1257 (2022)