Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Neuro-Dominating set scheme for a fast and efficient robot deployment in internet of robotic things., , , and . Ad Hoc Networks, (2019)TACASHI: Trust-Aware Communication Architecture for Social Internet of Vehicles., , , , , , , and . IEEE Internet of Things Journal, 6 (4): 5870-5877 (2019)A mobility-adaptive information reduction scheme for vehicle safety communications on highways., , and . ITST, page 722-726. IEEE, (2012)Welcome message from the general chairs., and . WiMob, page 1-5. IEEE Computer Society, (2010)Space Cloudlet Aided Caching Placement Strategy for Remote Mobile Social Networks., , , , and . PIMRC, page 1776-1781. IEEE, (2018)Wireless User Authentication Based on KLT and Gaussian Mixture Model., , , , , , and . WCNC, page 1-5. IEEE, (2019)Power Allocation-Based NOMA and Underlay D2D Communication for Public Safety Users in the 5G Cellular Network., , , and . IEEE Syst. J., 17 (3): 3572-3583 (September 2023)Collaborative Honeypot Defense in UAV Networks: A Learning-Based Game Approach., , , , , and . CoRR, (2022)SDN-based Resource Allocation in Edge and Cloud Computing Systems: An Evolutionary Stackelberg Differential Game Approach., , , , and . CoRR, (2021)ViCoV: Efficient video streaming for cognitive radio VANET., , and . Veh. Commun., 1 (3): 105-122 (2014)