Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Supervoxel-based brain tumor segmentation with multimodal MRI images., , , , and . Signal Image Video Process., 16 (5): 1215-1223 (2022)Bidirectional Underwater Blue-green Laser Communication Based on OFDM Modulation., , , , and . ICCNS, page 49-54. ACM, (2021)Editorial Special Section on Wireless Network Security and Privacy.. IEEE Trans. Vehicular Technology, 59 (2): 518 (2010)Managing Wireless Sensor Networks with Supply Chain Strategy., , , and . QSHINE, page 59-66. IEEE Computer Society, (2004)JR-SND: Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc Networks., , and . ICDCS, page 529-538. IEEE Computer Society, (2011)SIP: a secure incentive protocol against selfishness in mobile ad hoc networks., , and . WCNC, page 1679-1684. IEEE, (2004)Energy-Efficient Coverage Measurement for Wireless Sensor Networks., , and . GLOBECOM, IEEE, (2006)mmLock: User Leaving Detection Against Data Theft via High-Quality mmWave Radar Imaging., , , , , and . ICCCN, page 1-10. IEEE, (2023)DOT-M: A Dual Offline Transaction Scheme of Central Bank Digital Currency for Trusted Mobile Devices., , and . NSS, volume 13787 of Lecture Notes in Computer Science, page 233-248. Springer, (2022)A secure hierarchical deduplication system in cloud storage., , , and . IWQoS, page 1-10. IEEE, (2016)