Author of the publication

Untraceability of mobile devices in wireless mesh networks using linear network coding.

, , , and . INFOCOM, page 270-274. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Image Set Compression with Content Adaptive Sparse Dictionary., , , and . DICTA, page 1-8. IEEE, (2017)Uncertainty-Aware Sensor Deployment Strategy in Mixed Wireless Sensor Networks., , , , and . IJDSN, (2013)Multiresolution neural networks for omnifont character recognition., and . ICNN, page 1588-1593. IEEE, (1993)Neural network-based position synchronised internal force control scheme for cooperative manipulator system., , and . Int. J. Systems Science, 48 (12): 2485-2498 (2017)Introducing Partitioning Training Set Strategy to Intrinsic Incremental Evolution., and . MICAI, volume 4293 of Lecture Notes in Computer Science, page 272-282. Springer, (2006)Complete FPGA Implemented Evolvable Image Filters., and . MICAI, volume 4293 of Lecture Notes in Computer Science, page 767-777. Springer, (2006)A Particle Swarm Optimization and Mutation Operator Based Node Deployment Strategy for WSNs., , , , and . ICCCS (1), volume 10602 of Lecture Notes in Computer Science, page 430-437. Springer, (2017)DeepList: Learning Deep Features With Adaptive Listwise Constraint for Person Reidentification., , , , and . IEEE Trans. Circuits Syst. Video Techn., 27 (3): 513-524 (2017)An Improved Trust Model Based on Time Effect., , , and . CSA/CUTE, volume 474 of Lecture Notes in Electrical Engineering, page 376-381. Springer, (2017)Outsourced data tagging via authority and delegable auditing for cloud storage., , , and . ICCST, page 131-134. IEEE, (2015)