Author of the publication

Security and Privacy Challenges in 5G-Enabled Vehicular Networks.

, , , and . IEEE Netw., 34 (2): 37-45 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FESCIM: Fair, Efficient, and Secure Cooperation Incentive Mechanism for Multihop Cellular Networks., and . IEEE Trans. Mob. Comput., 11 (5): 753-766 (2012)Toward Energy-Efficient and Robust Large-Scale WSNs: A Scale-Free Network Approach., , , , , and . IEEE J. Sel. Areas Commun., 34 (12): 4035-4047 (2016)Reconfigurable intelligent surfaces for smart wireless environments: channel estimation, system design and applications in 6G networks., , , , , , , , and . Sci. China Inf. Sci., (2021)Secure provenance: the essential of bread and butter of data forensics in cloud computing., , , and . AsiaCCS, page 282-292. ACM, (2010)Joint Cache Placement and Content Delivery in Satellite-Terrestrial Integrated C-RANs., , , , and . ICC, page 1-6. IEEE, (2021)Data Poisoning Attack Against Anomaly Detectors in Digital Twin-Based Networks., , , , , and . ICC, page 13-18. IEEE, (2023)mmWave IEEE 802.11ay for 5G Fixed Wireless Access., , , , and . IEEE Wirel. Commun., 27 (2): 88-95 (2020)Adaptive Resource Allocation in Quantum Key Distribution (QKD) for Federated Learning., , , , , and . CoRR, (2022)Catalyzing Cloud-Fog Interoperation in 5G Wireless Networks: An SDN Approach., , , , and . IEEE Netw., 31 (5): 14-20 (2017)Cross-Domain Resource Orchestration for the Edge-Computing-Enabled Smart Road., , , , , , and . IEEE Netw., 34 (5): 60-67 (2020)