Author of the publication

A novel scheme for protecting receiver's location privacy in wireless sensor networks.

, , , and . IEEE Trans. Wirel. Commun., 7 (10): 3769-3779 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Top-N recommendation algorithm integrated neural network., and . Neural Comput. Appl., 33 (9): 3881-3889 (2021)Asset Price Prediction via Machine-Learning Method: A Review., , and . CIS, page 168-172. IEEE, (2021)Inertia and feedback parameters adaptive control of virtual synchronous generator., , , and . CoRR, (2020)A Brief Review of Two Classical Models for Asset Allocating., , , and . CIS, page 159-163. IEEE, (2020)Research on Workflow Modeling based on Coloured Petri Net., , and . ICEIS (1), page 423-426. SciTePress, (2011)Operating binary strings using gliders and eaters in reaction-diffusion cellular automaton, , , and . CoRR, (2009)General approach to reversing ketol-acid reductoisomerase cofactor dependence from NADPH to NADH, , , , , , , , and . Proc. Natl. Acad. Sci. U. S. A., (2013)Complex electromechanical system condition monitoring based on improved particle swarm optimisation RBF for audio visual fusion., , and . IJRIS, 9 (3/4): 170-176 (2017)Randomized Block Frank-Wolfe for Convergent Large-Scale Learning., , , and . CoRR, (2016)Energy Harvesting for Physical Layer Security in Cooperative Networks Based on Compressed Sensing., , , and . Entropy, 19 (9): 462 (2017)