Author of the publication

Secure Data Sharing Framework via Hierarchical Greedy Embedding in Darknets.

, , , , , and . Mob. Networks Appl., 26 (2): 940-948 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust Truth Discovery Against Multi-round Data Poisoning Attacks., , , and . WASA (1), volume 13471 of Lecture Notes in Computer Science, page 258-270. Springer, (2022)Hierarchical Name-based Routing for Content Provider Mobility in ICN., , , , , , and . IWCMC, page 941-946. IEEE, (2023)LocJury: An IBN-Based Location Privacy Preserving Scheme for IoCV., , , , and . IEEE Trans. Intell. Transp. Syst., 22 (8): 5028-5037 (2021)Preserving Location Privacy in Mobile Edge Computing., , , , and . ICC, page 1-6. IEEE, (2019)Bitcoin Network Size Estimation Based on Coupon Collection Model., , , , , , and . ICAIS (4), volume 11635 of Lecture Notes in Computer Science, page 298-307. Springer, (2019)Optimizing Mobility-Aware Task Offloading in Smart Healthcare for Internet of Medical Things Through Multiagent Reinforcement Learning., , , , , and . IEEE Internet Things J., 11 (8): 13677-13691 (April 2024)Lightweight Anonymous Geometric Routing for Internet of Things., , , , , , and . IEEE Access, (2019)A Review of the Factorization Problem of Large Integers., , , and . ICAIS (4), volume 11635 of Lecture Notes in Computer Science, page 202-213. Springer, (2019)Expected value model for a fuzzy random warehouse layout problem., and . FUZZ-IEEE, page 751-756. IEEE, (2004)Review on Fuzz Testing for Protocols in Industrial Control Systems., and . DSC, page 433-438. IEEE, (2021)