Author of the publication

Vulnerable Friend Identification: Who Should You Beware of Most in Online Social Networks?

, , , , , and . GLOBECOM, page 1-6. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Leveraging Machine Learning for Disease Diagnoses Based on Wearable Devices: A Survey., , , , and . IEEE Internet Things J., 10 (24): 21959-21981 (December 2023)Privacy-preserving scheme in social participatory sensing based on Secure Multi-party Cooperation., , , , , , and . Comput. Commun., (2018)Green small cell planning in smart cities under dynamic traffic demand., , , , , , and . INFOCOM Workshops, page 618-623. IEEE, (2015)Employing attribute-based encryption in systems with resource constrained devices in an information-centric networking context., , , and . GIoTS, page 1-6. IEEE, (2017)Ubiquitous Transmission of Multimedia Sensor Data in Internet of Things., , and . IEEE Internet of Things Journal, 5 (1): 403-414 (2018)An Intelligent Route Guidance Strategy based on Congestion Type for ITS., , , , and . ICC, page 5047-5052. IEEE, (2022)Editorial for QShine 2014 Special Issue., , , , and . Mob. Networks Appl., 21 (3): 387-389 (2016)Wireless sensor network deployment in mobile phones assisted environment., , and . IWQoS, page 1-9. IEEE, (2010)Quality-Of-Information Aware Data Delivery for Wireless Sensor Networks: Description and Experiments., and . WCNC, page 1-6. IEEE, (2010)An optimisation-based approach for wireless sensor deployment in mobile sensing environments., , , and . WCNC, page 2108-2112. IEEE, (2012)