Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fog-based storage technology to fight with cyber threat., , , , , , and . Future Gener. Comput. Syst., (2018)An intelligent incentive mechanism for coverage of data collection in cognitive internet of things., , , , and . Future Gener. Comput. Syst., (2019)A novel trust mechanism based on Fog Computing in Sensor-Cloud System., , , , , and . Future Gener. Comput. Syst., (2020)Pipeline slot based fast rerouting scheme for delay optimization in duty cycle based M2M communications., , , , and . Peer-to-Peer Netw. Appl., 12 (6): 1673-1704 (2019)On mitigating hotspots to maximize network lifetime in multi-hop wireless sensor network with guaranteed transport delay and reliability., , , , and . Peer-to-Peer Netw. Appl., 7 (3): 255-273 (2014)Energy-efficient routing for mobile data collectors in wireless sensor networks with obstacles., , , , and . Peer-to-Peer Netw. Appl., 10 (3): 472-483 (2017)A comprehensive analysis for fair probability marking based traceback approach in WSNs., , and . Secur. Commun. Networks, 9 (14): 2448-2475 (2016)Trust-Based Multi-Agent Imitation Learning for Green Edge Computing in Smart Cities., , , , and . IEEE Trans. Green Commun. Netw., 6 (3): 1635-1648 (2022)Adversarial training based lattice LSTM for Chinese clinical named entity recognition., , , , , and . J. Biomed. Informatics, (2019)ADTO: A Trust Active Detecting-based Task Offloading Scheme in Edge Computing for Internet of Things., , , , and . ACM Trans. Internet Techn., 24 (1): 5:1-5:25 (February 2024)