Predictive Control Plane Balancing in SD-IoT Networks Based on Elitism Genetic Algorithm and Non-Cooperative Game Theory.
IEEE Trans. Netw. Serv. Manag., February, 2025
A distributed identity management and cross-domain authentication scheme for the Internet of Things.
Future Gener. Comput. Syst., 2025
Revocable Certificateless Cross-Domain Authentication Scheme Based on Primary-Secondary Blockchain.
IEEE Trans. Comput. Soc. Syst., October, 2024
Meta Path-Aware Recommendation Method Based on Non-Negative Matrix Factorization in LBSN.
IEEE Trans. Netw. Serv. Manag., December, 2022
POI recommendation based on a multiple bipartite graph network model.
J. Supercomput., 2022
WSN Localization Technology Based on Hybrid GA-PSO-BP Algorithm for Indoor Three-Dimensional Space.
Wirel. Pers. Commun., 2020
A Multi-Element Hybrid Location Recommendation Algorithm for Location Based Social Networks.
IEEE Access, 2019
Efficient Hybrid Detection of Node Replication Attacks in Mobile Sensor Networks.
Mob. Inf. Syst., 2017
Node Localization of Wireless Sensor Network Based on Secondary Correction Error.
Proceedings of the Parallel Architecture, Algorithm and Programming, 2017
Layered Location-Based Security Mechanism for Mobile Sensor Networks: Moving Security Areas.
Sensors, 2015
Efficient localization for mobile sensor networks based on constraint rules optimized Monte Carlo method.
Comput. Networks, 2013
Securing wireless mesh networks in a unified security framework with corruption-resilience.
Comput. Networks, 2012
A collusion-resilient self-healing key distribution scheme for wireless sensor networks.
Proceedings of IEEE International Conference on Communications, 2012
Accurate and computation-efficient localization for mobile sensor networks.
Proceedings of the 2011 International Conference on Wireless Communications & Signal Processing, 2011
A Unified Security Framework for Multi-domain Wireless Mesh Networks.
Proceedings of the Information and Communications Security - 13th International Conference, 2011
An Unsupervised Host-Based Anomaly Intrusion Detection Technique Based on Non-negative Matrix Factorization.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007
Intrusion Detection Using Wavelet Transform and Non Negative Matrix Factorization.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007