Author of the publication

Energy-Efficient and Trustworthy Data Collection Protocol Based on Mobile Fog Computing in Internet of Things.

, , , , and . IEEE Trans. Ind. Informatics, 16 (5): 3531-3539 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

What is in Your App? Uncovering Privacy Risks of Female Health Applications., , , and . CoRR, (2023)An improved algorithm for dispatching the minimum number of electric charging vehicles for wireless sensor networks., , , , , and . Wirel. Networks, 25 (3): 1371-1384 (2019)Approval-Based Participatory Budgeting with Donations., , , and . COCOON (2), volume 14423 of Lecture Notes in Computer Science, page 404-416. Springer, (2023)Surface defects detection for mobilephone panel workpieces based on machine vision and machine learning., , , , , and . ICIA, page 370-375. IEEE, (2017)A Natural Scene Recognition Learning Based on Label Correlation., , and . IEEE Trans. Emerg. Top. Comput. Intell., 6 (1): 150-158 (2022)A Muti-detection Method of Covert Timing Channel Based on Perceptual Hashing., , and . SpaCCS Workshops, volume 12383 of Lecture Notes in Computer Science, page 430-443. Springer, (2020)Greedy+Max: An Efficient Approximation Algorithm for k-Submodular Knapsack Maximization., , , , and . COCOA (1), volume 14461 of Lecture Notes in Computer Science, page 287-299. Springer, (2023)A CELP variable rate speech codec with low average rate., , and . ICASSP, page 735-738. IEEE Computer Society, (1997)Improving DFA on AES using all-fault ciphertexts., , , , , , and . ASICON, page 283-286. IEEE, (2017)Multiple human upper bodies detection via candidate-region convolutional neural network., , and . Multimedia Tools Appl., 78 (12): 16077-16096 (2019)