From post

Minimizing Resource Expenditure While Maximizing Destructiveness for Node Capture Attacks.

, , , и . ICA3PP (3), том 9530 из Lecture Notes in Computer Science, стр. 403-416. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Research on Task Allocation Strategy and Scheduling Algorithm of Multi-core Load Balance., , , и . CISIS, стр. 634-638. IEEE Computer Society, (2013)Poster: bacteria inspired mitigation of selfish users in ad-hoc social networks., , , , , и . MobiHoc, стр. 421-422. ACM, (2014)Poster: CIS: a community-based incentive scheme for socially-aware networking., , , , , и . MobiHoc, стр. 437-438. ACM, (2014)An Emergent Backpressure Queueing Model for Internet of Things., , , , и . iThings/GreenCom/CPSCom/SmartData, стр. 651-654. IEEE Computer Society, (2017)A low-cost node capture attack algorithm for wireless sensor networks., , , и . Int. J. Commun. Syst., 29 (7): 1251-1268 (2016)Recurrent Broad Learning Systems for Time Series Prediction., , , и . IEEE Trans. Cybern., 50 (4): 1405-1417 (2020)Evaluating IEEE 802.15.4 for Cyber-Physical Systems., , , , и . EURASIP J. Wirel. Commun. Netw., (2011)An Intelligent Robust Networking Mechanism for the Internet of Things., , , , и . IEEE Commun. Mag., 57 (11): 91-95 (2019)Soft Actor-Critic-Based Multilevel Cooperative Perception for Connected Autonomous Vehicles., , , , и . IEEE Internet Things J., 9 (21): 21370-21381 (2022)Intelligent Fingerprint-Based Localization Scheme Using CSI Images for Internet of Things., , , , , и . IEEE Trans. Netw. Sci. Eng., 9 (4): 2378-2391 (2022)