Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient DoS-limiting Support by Indirect Mapping in Networks with Locator/Identifier Separation., , , and . JNW, 8 (1): 92-99 (2013)Towards green for relay in InterPlaNetary Internet based on differential game model., , , and . SCIENCE CHINA Information Sciences, 57 (4): 1-9 (2014)A optimal power control strategy based on network wisdom in wireless networks., , , and . Oper. Res. Lett., 40 (6): 475-477 (2012)Adaptive resource scheduling mechanism in P2P file sharing system., , , and . Peer-to-Peer Networking and Applications, 9 (6): 1089-1100 (2016)Hypergraph clustering model-based association analysis of DDOS attacks in fog computing intrusion detection system., , , and . EURASIP J. Wireless Comm. and Networking, (2018)Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC., , , , and . Wireless Communications and Mobile Computing, (2018)Fair Resource Allocation in an Intrusion-Detection System for Edge Computing: Ensuring the Security of Internet of Things Devices., , , , and . IEEE Consumer Electronics Magazine, 7 (6): 45-50 (2018)A New Resource Allocation Mechanism for Security of Mobile Edge Computing System., , , and . IEEE Access, (2019)A Novel Utility Based Resource Management Scheme in Vehicular Social Edge Computing., , , and . IEEE Access, (2018)Recent Advances in Cloud-Aware Mobile Fog Computing., , , and . Wireless Communications and Mobile Computing, (2019)