Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-Level Virtual Ring: Cross-Level Name Routing with Embedded Identifier in Sensor Network., and . ICWN, page 67-74. CSREA Press, (2009)Designing a Secure Blockchain-Based Supply Chain Management Framework., , , , and . J. Comput. Inf. Syst., 63 (3): 592-607 (May 2023)Variational auto-encoder based Bayesian Poisson tensor factorization for sparse and imbalanced count data., , , , , , and . Data Min. Knowl. Discov., 35 (2): 505-532 (2021)Silence is Golden: Enhancing Privacy of Location-Based Services by Content Broadcasting and Active Caching in Wireless Vehicular Networks., , , , , and . IEEE Trans. Veh. Technol., 65 (12): 9942-9953 (2016)Privacy on the Edge: Customizable Privacy-Preserving Context Sharing in Hierarchical Edge Computing., , , , , and . IEEE Trans. Netw. Sci. Eng., 7 (4): 2298-2309 (2020)A Hybrid Privacy Protection Scheme in Cyber-Physical Social Networks., , , , and . IEEE Trans. Comput. Soc. Syst., 5 (3): 773-784 (2018)A Fog-Based Recommender System., , , , , , and . IEEE Internet Things J., 7 (2): 1048-1060 (2020)Decentralized Privacy Using Blockchain-Enabled Federated Learning in Fog Computing., , , , , , and . IEEE Internet Things J., 7 (6): 5171-5183 (2020)Sustainability Analysis for Fog Nodes With Renewable Energy Supplies., , , , , , and . IEEE Internet Things J., 6 (4): 6725-6735 (2019)Toward IoT Node Authentication Mechanism in Next Generation Networks., , , , , and . IEEE Internet Things J., 10 (15): 13333-13341 (August 2023)