Author of the publication

A Blockchain-Based Secure Searching Strategy for Metadata in Mobile Edge Computing.

, , , , , and . IEEE Internet Things J., 10 (22): 19795-19809 (November 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tuple Measure Model Based on CFI-Apriori Algorithm., , and . ICAIS (1), volume 12239 of Lecture Notes in Computer Science, page 49-61. Springer, (2020)Performance Investigation of Uniaxially Tensile Stressed Ge n-FinFETs Formed on Biaxially Strained GeOI Substrates And Its Impact On Ge CMOS Inverters., , , , , , and . ASICON, page 1-4. IEEE, (2019)Glowworm swarm optimisation based task scheduling for cloud computing., , and . ICC, page 152:1-152:7. ACM, (2017)Glowworm Swarm Optimisation for Training Multi-Layer Perceptrons., , and . BDCAT, page 131-138. ACM, (2017)FSPool: Learning Set Representations with Featurewise Sort Pooling., , and . ICLR, OpenReview.net, (2020)A smart RFID system., , , and . IWQoS, page 1-2. IEEE, (2010)Enabling low bit-rate and reliable video surveillance over practical wireless sensor network., , , , and . J. Supercomput., 65 (1): 287-300 (2013)FOX: Fast Overlapping Community Detection Algorithm in Big Weighted Networks., , , and . ACM Trans. Soc. Comput., 3 (3): 16:1-16:23 (2020)Providing Microgrid Resilience during Emergencies Using Distributed Energy Resources., , , , and . GLOBECOM Workshops, page 1-6. IEEE, (2015)An Empirical Study Towards Understanding How Deep Convolutional Nets Recognize Falls., and . ECCV Workshops (6), volume 11134 of Lecture Notes in Computer Science, page 112-127. Springer, (2018)