Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An incentive-based protection and recovery strategy for secure big data in social networks., , , , , and . Inf. Sci., (2020)Wi-Fi Radar Placement for Coverage in Collapsed Structures., , , and . ISPA/IUCC/BDCloud/SocialCom/SustainCom, page 423-430. IEEE, (2018)Energy-efficient healthcare monitoring with smartphones and IoT technologies., , and . IJHPCN, 8 (2): 186-194 (2015)Auction-based adaptive sensor activation algorithm for target tracking in wireless sensor networks., , , , and . Future Gener. Comput. Syst., (2014)Preserving Balance Between Privacy and Data Integrity in Edge-Assisted Internet of Things., , , , , and . IEEE Internet of Things Journal, 7 (4): 2679-2689 (2020)Forward to the special issue of the 9th International Symposium on Cyberspace Safety and Security (CSS 2017)., , , and . Concurr. Comput. Pract. Exp., (2019)Foreword to the special issue on security, privacy, and social networks., , , and . Concurr. Comput. Pract. Exp., (2019)Hypergraph partitioning for social networks based on information entropy modularity., , , and . J. Netw. Comput. Appl., (2017)Sensing and Decision Making in Cyber-Physical Systems: The Case of Structural Event Monitoring., , , and . IEEE Trans. Ind. Informatics, 12 (6): 2103-2114 (2016)Detecting Movements of a Target Using Face Tracking in Wireless Sensor Networks., , , and . IEEE Trans. Parallel Distributed Syst., 25 (4): 939-949 (2014)