Author of the publication

PSO-TPS: An Optimal Trust Path Selection Algorithm Based on Particle Swarm Optimization in Small World Network.

, , , , , and . CGC, page 594-600. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anonymous three-factor authenticated key agreement for wireless sensor networks., , , and . Wireless Networks, 25 (4): 1461-1475 (2019)SSL-STR: Semi-Supervised Learning for Sparse Trust Recommendation., , , , and . GLOBECOM, page 1-6. IEEE, (2019)Inferring Patterns for Taint-Style Vulnerabilities With Security Patches., , , and . IEEE Access, (2019)A Holistic Client Selection Scheme in Federated Mobile CrowdSensing Based on Reverse Auction., , , , and . CSCWD, page 1305-1310. IEEE, (2022)PEM4RFID: Privacy Enhancement Model for RFID Systems., , , , , and . ICA3PP (3), volume 9530 of Lecture Notes in Computer Science, page 682-694. Springer, (2015)GDTM: Gaussian Differential Trust Mechanism for Optimal Recommender System., , , , , , and . ICA3PP (6), volume 14492 of Lecture Notes in Computer Science, page 78-92. Springer, (2023)Utilizing Risk Number and Program Slicing to Improve Human-Machine Pair Inspection., , , and . ICECCS, page 108-115. IEEE, (2023)Data Interpolating over RFID Data Streams for Missed Readings., , , and . WAIM Workshops, volume 7901 of Lecture Notes in Computer Science, page 257-265. Springer, (2013)MP-MID: Multi-Protocol Oriented Middleware-level Intrusion Detection method for wireless sensor networks., , , and . Future Gener. Comput. Syst., (2017)The Automatic Formation of Agent Societies: A Service-Driven Approach., , and . ALPIT, page 556-561. IEEE Computer Society, (2008)