Author of the publication

A Signal Contour Extraction Algorithm based on Canny Operator and its Application in Bionic Communication.

, , , , , and . ICPADS, page 2698-2705. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DESLR: Energy-efficient and secure layered routing based on channel-aware trust model for UASNs., , , and . Comput. Networks, (October 2023)An SDN-Enabled Framework for a Load-Balanced and QoS-Aware Internet of Underwater Things., , , , and . IEEE Internet Things J., 10 (9, May 1): 7824-7834 (2023)Hybrid Mac Protocol Based on Security in Clustering Topology., , , and . SPIoT (2), volume 1283 of Advances in Intelligent Systems and Computing, page 439-444. Springer, (2020)Application of Bionics in Underwater Acoustic Covert Communication., , , and . SPIoT (2), volume 1283 of Advances in Intelligent Systems and Computing, page 205-210. Springer, (2020)Research on Delay and Packet Loss Control Mechanism in Wireless Mesh Networks., , and . J. Networks, 9 (4): 859-865 (2014)Research on the Intrusion Detection Model of Underwater Sensor Networks., , , , and . J. Sensors, (2022)GHL-SAR: Secure and Adaptive Routing Based on GMM-HMM-LSTM for UASNs., , , and . GLOBECOM, page 4540-4545. IEEE, (2023)Energy-Saving and Efficient Underwater Wireless Sensor Network Security Data Aggregation Model., , , , and . SPIoT (2), volume 1283 of Advances in Intelligent Systems and Computing, page 211-216. Springer, (2020)Data Uploading Strategy for Underwater Wireless Sensor Networks., , and . Sensors, 19 (23): 5265 (2019)Anomaly Detection of Underwater Sensor Data Based on Temporal and Spatial Correlation., , , , , and . ICAIS (2), volume 13339 of Lecture Notes in Computer Science, page 239-252. Springer, (2022)