Author of the publication

A Location Prediction-Based Helper Selection Scheme for Suspicious Eavesdroppers.

, , , , and . Wirel. Commun. Mob. Comput., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Static Analysis of Wearable Lower Extremity Exoskeleton Based on ANSYS Workbench., , , , and . MSN, page 510-514. IEEE Computer Society, (2013)Bumpless interconnects formed with nanowire ACF for 3D applications., , and . 3DIC, page 1-6. IEEE, (2014)Construction of virtual experiment platform for research about vehicle driving control at energy-saving., , and . CSCWD, page 427-431. IEEE, (2010)A simple multi-symbol detector for CPM signals., , , , and . WCSP, page 1-4. IEEE, (2013)A secure and privacy-preserving key agreement and mutual authentication scheme., , and . Int. J. Sens. Networks, 34 (4): 201-213 (2020)Design of Strong Signal Masking Covert Communication Transmission Scheme Based on OFDM System., and . ICCT, page 169-173. IEEE, (2019)An Abnormal Login Detection Method Based on Multi-source Log Fusion Analysis., , , , , and . ICBK, page 229-235. IEEE, (2019)Energy-efficient data dissemination strategy for roadside infrastructure in VCPS., , , , and . EURASIP J. Wireless Comm. and Networking, (2016)Does software reliability growth behavior follow a non-homogeneous Poisson process., , , , and . Inf. Softw. Technol., 50 (12): 1232-1247 (2008)Accurately Estimating User Cardinalities and Detecting Super Spreaders Over Time., , , , , , , and . IEEE Trans. Knowl. Data Eng., 34 (1): 92-106 (2022)