Author of the publication

Resource Allocation Strategy in Fog Computing Based on Priced Timed Petri Nets.

, , , , and . IEEE Internet of Things Journal, 4 (5): 1216-1228 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Clustering Collision Power Attack on RSA-CRT., , , , , and . Comput. Syst. Sci. Eng., 36 (2): 417-434 (2021)Robust Audio Watermarking Algorithm Based on Moving Average and DCT., , and . ICAIS (3), volume 11634 of Lecture Notes in Computer Science, page 419-429. Springer, (2019)An anonymous entropy-based location privacy protection scheme in mobile social networks., , , , and . EURASIP J. Wireless Comm. and Networking, (2019)Condition Evaluation of an Existing T-Beam Bridge Based on Neutral Axis Variation Monitored with Ultrasonic Coda Waves in a Network of Sensors., , , and . Sensors, 20 (14): 3895 (2020)RcDT: Privacy Preservation Based on R-Constrained Dummy Trajectory in Mobile Social Networks., , , and . IEEE Access, (2019)A Secure Energy-Saving Communication and Encrypted Storage Model Based on RC4 for EHR., , and . IEEE Access, (2020)Unexpected Data Dependency Creation and Chaining: A New Attack to SDN., , , , , and . SP, page 1512-1526. IEEE, (2020)Forecasting of Forex Time Series Data Based on Deep Learning., , , , , and . IIKI, volume 147 of Procedia Computer Science, page 647-652. Elsevier, (2018)Priced Timed Petri Nets Based Resource Allocation Strategy for Fog Computing., , and . IIKI, page 39-44. IEEE Computer Society, (2016)rFedFW: Secure and trustable aggregation scheme for Byzantine-robust federated learning in Internet of Things., , , , , and . Inf. Sci., (January 2024)