Author of the publication

Cscan: A Correlation-based Scheduling Algorithm for Wireless Sensor Networks.

, , , and . ICNSC, page 1025-1030. IEEE, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Collaborative Scheduling in Dynamic Environments Using Error Inference., , , , , , and . IEEE Trans. Parallel Distributed Syst., 25 (3): 591-601 (2014)Long-term and seasonal variation in groundwater storage in the North China Plain based on GRACE., , , , and . Int. J. Appl. Earth Obs. Geoinformation, (2021)Puppet attack: A denial of service attack in advanced metering infrastructure network., , , , and . J. Netw. Comput. Appl., (2016)Simpler is Sometimes Better: A Dynamic Aero-Engine Calibration Study., , , , , and . ICSI (2), volume 13345 of Lecture Notes in Computer Science, page 343-352. Springer, (2022)Fairer Machine Learning Through the Hybrid of Multi-objective Evolutionary Learning and Adversarial Learning., , , and . IJCNN, page 1-9. IEEE, (2023)Green firewall: An energy-efficient intrusion prevention mechanism in wireless sensor network., , , , and . GLOBECOM, page 3037-3042. IEEE, (2012)Mitigating Unfairness via Evolutionary Multiobjective Ensemble Learning., , , , , and . IEEE Trans. Evol. Comput., 27 (4): 848-862 (2023)Sentiment-Driven Price Prediction of the Bitcoin based on Statistical and Deep Learning Approaches., , , , , , and . IJCNN, page 1-8. IEEE, (2020)A denial of service attack in advanced metering infrastructure network., , , , and . ICC, page 1029-1034. IEEE, (2014)WiRE: Security Bootstrapping for Wireless Device-to-Device Communication., , , , , and . WCNC, page 1-7. IEEE, (2020)