Author of the publication

Wireless sensor network security defense strategy based on Bayesian reputation evaluation model.

, , , , , and . IET Commun., 18 (1): 55-62 (January 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Measurements of the congestion responsiveness of windows streaming media., , , and . NOSSDAV, page 94-99. ACM, (2004)Characteristics of streaming media stored on the Web., , , and . ACM Trans. Internet Techn., 5 (4): 601-626 (2005)LB-Chain: Load-Balanced and Low-Latency Blockchain Sharding via Account Migration., , and . IEEE Trans. Parallel Distributed Syst., 34 (10): 2797-2810 (October 2023)Personalized Query Suggestion with Searching Dynamic Flow for Online Recruitment., , , , , and . CIKM, page 2773-2783. ACM, (2022)VMSMO: Learning to Generate Multimodal Summary for Video-based News Articles., , , , , and . EMNLP (1), page 9360-9369. Association for Computational Linguistics, (2020)Mutual Diverse-Label Adversarial Training., , and . ICONIP (1), volume 13623 of Lecture Notes in Computer Science, page 64-75. Springer, (2022)Capturing Relations between Scientific Papers: An Abstractive Model for Related Work Section Generation., , , , , , and . ACL/IJCNLP (1), page 6068-6077. Association for Computational Linguistics, (2021)On Building an Automatic Identification of Country-Specific Feature Requests in Mobile App Reviews: Possibilities and Challenges., , , , and . ICSE (Workshops), page 494-498. ACM, (2020)Advertising Versus Brokerage Model for Online Trading Platforms., , and . MIS Q., 40 (3): 575-596 (2016)Wireless sensor network security defense strategy based on Bayesian reputation evaluation model., , , , , and . IET Commun., 18 (1): 55-62 (January 2024)