Author of the publication

Defense scheme against advanced persistent threats in mobile fog computing security.

, , , , , and . Comput. Networks, (February 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tracking areas planning based on spectral clustering in small cell networks., , , , and . IET Commun., 13 (13): 1921-1927 (2019)Hybrid Precoding Design for Two-Way Relay-Assisted Terahertz Massive MIMO Systems., , , , , and . IEEE Access, (2020)A fusing framework of shortcut convolutional neural networks., , , , , , , and . Inf. Sci., (2021)RBO-EM: Reduced Broadcast Overhead Scheme for Emergency Message Dissemination in VANETs., , , , and . IEEE Access, (2020)Security in Fog Computing: A Novel Technique to Tackle an Impersonation Attack., , , , , , and . IEEE Access, (2018)Weakly-supervised butterfly detection based on saliency map., , , , , , and . Pattern Recognit., (June 2023)A Joint Optimization Framework for Energy Harvesting Based Cooperative CR Networks., , , , and . IEEE Trans. Cogn. Commun. Netw., 5 (2): 452-462 (2019)Efficient clustering of large uncertain graphs using neighborhood information., , , and . Int. J. Approx. Reason., (2017)AAKE-BIVT: Anonymous Authenticated Key Exchange Scheme for Blockchain-Enabled Internet of Vehicles in Smart Transportation., , , , , , and . IEEE Trans. Intell. Transp. Syst., 24 (2): 1739-1755 (February 2023)Hybrid Edge-Cloud Collaborator Resource Scheduling Approach Based on Deep Reinforcement Learning and Multiobjective Optimization., , , , , and . IEEE Trans. Computers, 73 (1): 192-205 (January 2024)