Author of the publication

Blockchain Based Data Protection Framework for IoT in Untrusted Storage.

, , , , , and . CSCWD, page 813-818. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research on Task Allocation Strategy and Scheduling Algorithm of Multi-core Load Balance., , , and . CISIS, page 634-638. IEEE Computer Society, (2013)Throughput Prediction-Enhanced RL for Low-Delay Video Application., , , and . MSN, page 728-735. IEEE, (2022)Poster: bacteria inspired mitigation of selfish users in ad-hoc social networks., , , , , and . MobiHoc, page 421-422. ACM, (2014)Poster: CIS: a community-based incentive scheme for socially-aware networking., , , , , and . MobiHoc, page 437-438. ACM, (2014)An Emergent Backpressure Queueing Model for Internet of Things., , , , and . iThings/GreenCom/CPSCom/SmartData, page 651-654. IEEE Computer Society, (2017)Deep Learning and Superpixel Feature Extraction Based on Contractive Autoencoder for Change Detection in SAR Images., , , and . IEEE Trans. Ind. Informatics, 14 (12): 5530-5538 (2018)Soft Actor-Critic-Based Multilevel Cooperative Perception for Connected Autonomous Vehicles., , , , and . IEEE Internet Things J., 9 (21): 21370-21381 (2022)A low-cost node capture attack algorithm for wireless sensor networks., , , and . Int. J. Commun. Syst., 29 (7): 1251-1268 (2016)An Intelligent Robust Networking Mechanism for the Internet of Things., , , , and . IEEE Commun. Mag., 57 (11): 91-95 (2019)Learning-Driven Cloud Resource Provision Policy for Content Providers With Competitor., , , , and . IEEE Trans. Cloud Comput., 10 (3): 1913-1924 (2022)