Author of the publication

CAPR: context-aware participant recruitment mechanism in mobile crowdsourcing.

, , , , and . Wireless Communications and Mobile Computing, 16 (15): 2179-2193 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enabling fair spectrum sharing: mitigating selfish misbehaviors in spectrum contention., , , and . IEEE Network, 27 (3): 16-21 (2013)Two Tier Secure Routing Protocol for Heterogeneous Sensor Networks., , , and . IEEE Trans. Wireless Communications, 6 (9): 3395-3401 (2007)Auditing CPU Performance in Public Cloud., , , and . SERVICES, page 286-289. IEEE Computer Society, (2013)Automated Attack and Defense Framework for 5G Security on Physical and Logical Layers., , , , , and . CoRR, (2019)Vcash: A Novel Reputation Framework for Identifying Denial of Traffic Service in Internet of Connected Vehicles., , , , , , and . CoRR, (2019)Preventing Piracy Content Propagation in Peer-to-Peer Networks., , , , and . IEEE Journal on Selected Areas in Communications, 31 (9-Supplement): 105-114 (2013)A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security., , , , and . CoRR, (2018)Secure Data Access for Wireless Body Sensor Networks., , , and . CoRR, (2018)An Optimal LTE-U Access Method for Throughput Maximization and Fairness Assurance., , , and . IPCCC, page 1-8. IEEE, (2018)Predicting Vulnerable Software Components Using Software Network Graph., , , and . CSS, volume 10581 of Lecture Notes in Computer Science, page 280-290. Springer, (2017)