Author of the publication

Compromise-Resilient Anti-jamming for Wireless Sensor Networks.

, , , and . ICICS, volume 6476 of Lecture Notes in Computer Science, page 140-154. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Open Source Software Vulnerability Propagation Analysis Algorithm based on Knowledge Graph., , , , , and . SmartCloud, page 121-127. IEEE, (2019)Bridging Modality Gap for Visual Grounding with Effecitve Cross-modal Distillation., , , , , and . CoRR, (2023)Research on Automatic Generation and Analysis Technology of Network Attack Graph., , , , , and . BigDataSecurity/HPSC/IDS, page 133-139. IEEE, (2020)Research on Bootstrapping Algorithm for Health Insurance Data Fraud Detection Based on Decision Tree., , , , , and . BigDataSecurity, page 57-62. IEEE, (2021)Node Similarity-based Search Method for Medical Insurance Heterogeneous Information Network., , , , , and . BigDataSecurity/HPSC/IDS, page 174-179. IEEE, (2022)Predicting Relations in SG-CIM Model Based on Graph Structure and Semantic Information., , , , , and . BigDataSecurity/HPSC/IDS, page 17-22. IEEE, (2022)A Data Collaboration Model for Collaborative Design Based on C-Net., , , , and . SEKE, page 541-544. Knowledge Systems Institute Graduate School, (2012)Cross-layer Enhanced Source Location Privacy in Sensor Networks., , , , , and . SECON, page 1-9. IEEE, (2009)Medicare Fraud Gang Discovery Based on Community Discovery Algorithms., , , , , and . BigDataSecurity/HPSC/IDS, page 206-211. IEEE, (2022)Formal Definition and Detection Algorithm for Passive Event in RFID Middleware., , , , , and . APWeb/WAIM, volume 5446 of Lecture Notes in Computer Science, page 538-543. Springer, (2009)