Author of the publication

Research on hidden malicious user detection problem.

, and . Secur. Commun. Networks, 7 (6): 958-963 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Incentive Mechanisms for Commercial Edge Caching in 5G Wireless Networks., , , , , and . IEEE Wirel. Commun., 25 (3): 72-78 (2018)Robust downlink power control using worst-case performance optimization., , , and . ISIT, page 2563-2567. IEEE, (2008)Crop Yield Prediction Based on Agrometeorological Indexes and Remote Sensing Data., , , and . Remote. Sens., 13 (10): 2016 (2021)A Hierarchical Vehicular-Based Architecture for Vehicular Networks: A Case Study on Computation Offloading., , , , and . IEEE Access, (2020)Fast Logistics Vehicle Localizing Based on EMVS-MIMO Radar and Edge Computing., , , and . IEEE Access, (2020)Computer-aided design of dental inlay restoration based on dual-factor constrained deformation., , , , and . Adv. Eng. Softw., (2017)A food source-updating information-guided artificial bee colony algorithm., , , and . Neural Comput. Appl., 30 (3): 775-787 (2018)PriGuarder: A Privacy-Aware Access Control Approach Based on Attribute Fuzzy Grouping in Cloud Environments., , , , and . IEEE Access, (2018)Mobile Edge Computing for Task Offloading in Small-Cell Networks via Belief Propagation., , , , and . ICC, page 1-6. IEEE, (2018)Human robot cooperation based on human intention inference., , and . ROBIO, page 350-355. IEEE, (2014)