Author of the publication

A Security Protocol for Wireless Sensor Networks.

, , , and . WSAN, volume 264 of IFIP, page 113-124. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

JeDi: Joint-Image Diffusion Models for Finetuning-Free Personalized Text-to-Image Generation., , , , , , and . CoRR, (2024)Top-Down Learning for Structured Labeling with Convolutional Pseudoprior., , and . ECCV (4), volume 9908 of Lecture Notes in Computer Science, page 302-317. Springer, (2016)Technology research of ultra-tightly integration about INS aided tracking loop based on EKF., , and . ICIIP, page 32. ACM, (2016)A Security Protocol for Wireless Sensor Networks., , , and . WSAN, volume 264 of IFIP, page 113-124. Springer, (2008)Controllable Video Generation With Sparse Trajectories., , and . CVPR, page 7854-7863. Computer Vision Foundation / IEEE Computer Society, (2018)Commonsense Prototype for Outdoor Unsupervised 3D Object Detection., , , , , and . CoRR, (2024)Magic3D: High-Resolution Text-to-3D Content Creation., , , , , , , , , and . CoRR, (2022)Learning to Evaluate Image Captioning., , , , and . CVPR, page 5804-5812. Computer Vision Foundation / IEEE Computer Society, (2018)Multimodal Conditional Image Synthesis with Product-of-Experts GANs., , , and . ECCV (16), volume 13676 of Lecture Notes in Computer Science, page 91-109. Springer, (2022)Features extraction for PSK signals recognition using nonuniform compressive samples based on high order transformation., , , , , and . ChinaSIP, page 886-890. IEEE, (2015)