Author of the publication

A Secure Node Localization Method Based on the Congruity of Time in Wireless Sensor Networks.

, , , , , and . TrustCom, page 884-889. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A generalized Dirac soliton hierarchy and its bi-Hamiltonian structure., , , , and . Appl. Math. Lett., (2016)Longitudinal diffusion tensor imaging and perfusion MRI investigation in a macaque model of neuro-AIDS: A preliminary study., , , , , and . NeuroImage, 58 (1): 286-292 (2011)Consistency Validation Method for Java Fine-Grained Lock Refactoring., , and . IEEE Access, (2021)A Robust 3D Model Watermarking Scheme Based on Feature Recognition., , , and . SNPD (3), page 989-993. IEEE Computer Society, (2007)HR-BGCN : Predicting readmission for heart failure from electronic health records., , , , , and . Artif. Intell. Medicine, (2024)The Cauchy Two-Matrix Model, C-Toda Lattice and CKP Hierarchy., and . J. Nonlinear Sci., 29 (1): 3-27 (2019)Effects of Long-Duration Administration of 1% Isoflurane on Resting Cerebral Blood Flow and Default Mode Network in Macaque Monkeys., and . Brain Connect., 7 (2): 98-105 (2017)A Fractal Watermarking Scheme for Image in DWT Domain., , , and . SNPD (1), page 364-368. IEEE Computer Society, (2007)Safety warning of coal mining face based on big data association rule mining., and . J. Comput. Methods Sci. Eng., 22 (4): 1035-1052 (2022)Impacts of consumer virtual showrooming behavior on manufacturer and retailer strategic decisions in a dual-channel supply chain., , and . Eur. J. Oper. Res., 313 (1): 325-342 (February 2024)