Author of the publication

Attack Distribution Modeling and Its Applications in Sensor Network Security.

, , , and . EURASIP J. Wireless Comm. and Networking, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sensor network security: a survey., , , and . IEEE Commun. Surv. Tutorials, 11 (2): 52-73 (2009)A New Network Topology Evolution Generator Based on Traffic Increase and Distribution Model., , , and . ICN, page 56. IEEE Computer Society, (2007)Working Pose and Layout Optimization of surgical robot., , , , , and . EMBC, page 4728-4731. IEEE, (2020)Development and Control of a CT Fluoroscopy Guided Lung Puncture Robot., , , , , , and . ICIRA (3), volume 13015 of Lecture Notes in Computer Science, page 61-70. Springer, (2021)A Low-Computation Approach to Point Cloud Filtering via Lidar and Camera Fusion., , , and . ICDL, page 486-491. IEEE, (2023)Power Grid Fault Diagnosis Method Using Intuitionistic Fuzzy Petri Nets Based on Time Series Matching., , , and . Complex., (2019)A tendon-driven prosthetic hand using continuum structure*., , , , , and . EMBC, page 4951-4954. IEEE, (2020)Influence of multi-angle input of intraoperative fluoroscopic images on the spatial positioning accuracy of the C-arm calibration-based algorithm of a CAOS system., , , , , and . Medical Biol. Eng. Comput., 58 (3): 559-572 (2020)Attack Distribution Modeling and Its Applications in Sensor Network Security., , , and . EURASIP J. Wireless Comm. and Networking, (2008)A proactive secure routing algorithm defense against node compromise in sensor networks., , , , and . LCN, page 557-559. IEEE Computer Society, (2008)