Author of the publication

A peer to peer traffic identification method based on wavelet and particle swarm optimization algorithm.

, , and . Int. J. Wavelets Multiresolution Inf. Process., 13 (6): 1550048:1-1550048:23 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LEACH-G: an Optimal Cluster-heads Selection Algorithm based on LEACH., , , and . J. Softw., 8 (10): 2660-2667 (2013)Automated Trust Negotiation Model based on Dynamic Game of Incomplete Information., , , , and . J. Softw., 8 (10): 2668-2674 (2013)Prediction of Crime Hotspots based on Spatial Factors of Random Forest., , , , , , and . ICCSE, page 811-815. IEEE, (2020)Design of Video Cloud Networking Scheme in expressway., , , and . ICCSE, page 345-348. IEEE, (2020)Two Constructions of Multireceiver Encryption Supporting Constant Keys, Short Ciphertexts, and Identity Privacy., , , and . Int. J. Netw. Secur., 14 (5): 270-279 (2012)Improved K-means algorithm based on hybrid rice optimization algorithm., , , and . IDAACS, page 788-791. IEEE, (2017)Enhanced network optimized generative adversarial network for image enhancement., , , , , and . Multim. Tools Appl., 80 (9): 14363-14381 (2021)Lightweight object detection model fused with feature pyramid., , , , and . Multim. Tools Appl., 82 (1): 601-618 (2023)An image denoising method based on BP neural network optimized by improved whale optimization algorithm., , , , and . EURASIP J. Wirel. Commun. Netw., 2021 (1): 141 (2021)A Feature Selection Approach for Network Intrusion Detection Based on Tree-Seed Algorithm and K-Nearest Neighbor., , , , and . IDAACS-SWS, page 68-72. IEEE, (2018)