Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fidelity in Simulation-Based Serious Games., , , and . IEEE Trans. Learn. Technol., 13 (2): 340-353 (2020)The yoking-proof-based authentication protocol for cloud-assisted wearable devices., , , , and . Personal and Ubiquitous Computing, 20 (3): 469-479 (2016)A survey of RDF management technologies and benchmark datasets., , , and . J. Ambient Intell. Humaniz. Comput., 9 (5): 1693-1704 (2018)Task Allocation Among Connected Devices: Requirements, Approaches, and Challenges., , and . IEEE Internet Things J., 9 (2): 1009-1023 (2022)From IoT to Future Cyber-Enabled Internet of X and Its Fundamental Issues., , , and . IEEE Internet Things J., 8 (7): 6077-6088 (2021)A Trustworthy Safety Inspection Framework Using Performance-Security Balanced Blockchain., , , , , , and . IEEE Internet Things J., 9 (11): 8178-8190 (2022)Security and Privacy Preservation Scheme of Face Identification and Resolution Framework Using Fog Computing in Internet of Things., , , , , and . IEEE Internet Things J., 4 (5): 1143-1155 (2017)A Survey on the Metaverse: The State-of-the-Art, Technologies, Applications, and Challenges., , , , , , , and . IEEE Internet Things J., 10 (16): 14671-14688 (August 2023)Using trust model to ensure reliable data acquisition in VANETs., , , and . Ad Hoc Networks, (2017)Top Challenges for Smart Worlds: A Report on the Top10Cs Forum., , , , , , , and . IEEE Access, (2015)