Author of the publication

Formal Threat Analysis for Ad-Hoc Routing Protocol: Modelling and Checking the Sybil Attack.

, , , and . Intell. Autom. Soft Comput., 17 (8): 1035-1047 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

mHMDA: Human Microbe-Disease Association Prediction by Matrix Completion and Multi-Source Information., , and . IEEE Access, (2019)q-Wiener index of some compound trees., , , and . Appl. Math. Comput., 218 (18): 9528-9535 (2012)FS-GBDT: identification multicancer-risk module via a feature selection algorithm by integrating Fisher score and GBDT., , , , , , , , and . Briefings Bioinform., (2021)Summ^N: A Multi-Stage Summarization Framework for Long Input Dialogues and Documents., , , , , , , , and . CoRR, (2021)Logic-Consistency Text Generation from Semantic Parses., , , , , and . ACL/IJCNLP (Findings), volume ACL/IJCNLP 2021 of Findings of ACL, page 4414-4426. Association for Computational Linguistics, (2021)A detector for page-level handwritten music object recognition based on deep learning., , , and . Neural Comput. Appl., 35 (13): 9773-9787 (May 2023)Did You Ask a Good Question? A Cross-Domain Question Intention Classification Benchmark for Text-to-SQL., , , , , and . CoRR, (2020)A Tensor Method Based on Enhanced Tensor Nuclear Norm and Hypergraph Laplacian Regularization for Pan-Cancer Omics Data Analysis., , and . IEEE J. Biomed. Health Informatics, 27 (3): 1225-1236 (March 2023)Formal Threat Analysis for Ad-Hoc Routing Protocol: Modelling and Checking the Sybil Attack., , , and . Intell. Autom. Soft Comput., 17 (8): 1035-1047 (2011)GRN: Gated Relation Network to Enhance Convolutional Neural Network for Named Entity Recognition., , , , , and . AAAI, page 6236-6243. AAAI Press, (2019)