Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trust management for service composition in SOA-based IoT systems., , and . WCNC, page 3444-3449. IEEE, (2014)Multiresolution classification with semi-supervised learning for indirect bridge structural health monitoring., , , , , , , , and . ICASSP, page 3412-3416. IEEE, (2013)Bounds on the differentiating-total domination number of a tree., , and . Discrete Applied Mathematics, (2016)Scalable, adaptive and survivable trust management for community of interest based Internet of Things systems., , and . ISADS, page 1-7. IEEE Computer Society, (2013)Trust-Based Service Management for Social Internet of Things Systems., , and . IEEE Trans. Dependable Sec. Comput., 13 (6): 684-696 (2016)Conditional diagnosability of the round matching composition networks., and . Theor. Comput. Sci., (2017)Using Deep Learning in Semantic Classification for Point Cloud Data., , , and . IEEE Access, (2019)Trust-Based IoT Participatory Sensing for Hazard Detection and Response., , , and . ICSOC Workshops, volume 10380 of Lecture Notes in Computer Science, page 79-84. Springer, (2016)An iterative beamforming scheme based on leakage sum-rate maximization criterion., , and . IC-NIDC, page 234-238. IEEE, (2016)Multicast Capacity-Delay Tradeoff with Network Coding in MANETs., , , , , , and . WASA, volume 6843 of Lecture Notes in Computer Science, page 72-83. Springer, (2011)