From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Toward Efficient Packet Buffering and Congestion Control Approaches for Reliable Data Delivery in Mobile Ad Hoc Network., , и . IDCS, том 8223 из Lecture Notes in Computer Science, стр. 65-77. Springer, (2013)CredFinder: A real-time tweets credibility assessing system., , , , и . ASONAM, стр. 1406-1409. IEEE Computer Society, (2016)Evolution of Dark Web Threat Analysis and Detection: A Systematic Approach., , , и . IEEE Access, (2020)TIMCC: On Data Freshness in Privacy-Preserving Incentive Mechanism Design for Continuous Crowdsensing Using Reverse Auction., , , , , и . IEEE Access, (2020)A lightweight machine learning-based authentication framework for smart IoT devices., , , , , и . Inf. Sci., (2019)Task Offloading and Resource Allocation for Mobile Edge Computing by Deep Reinforcement Learning Based on SARSA., , , , и . IEEE Access, (2020)Identifying cyber threats to mobile-IoT applications in edge computing paradigm., , , , и . Future Gener. Comput. Syst., (2018)Thermal-Aware Multiconstrained Intrabody QoS Routing for Wireless Body Area Networks., , , , и . Int. J. Distributed Sens. Networks, (2014)A Trusted Consensus Scheme for Collaborative Learning in the Edge AI Computing Domain., , , , , , , и . IEEE Netw., 35 (1): 204-210 (2021)ASA: Against statistical attacks for privacy-aware users in Location Based Service., , , , и . Future Gener. Comput. Syst., (2017)