Author of the publication

Access Delay Analysis in String Multi-hop Wireless Network Under Jamming Attack.

, and . ICA3PP (4), volume 11337 of Lecture Notes in Computer Science, page 549-559. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Request pattern change-based cache pollution attack detection and defense in edge computing., , , , , and . Digit. Commun. Networks, 9 (5): 1212-1220 (October 2023)Efficient application scheduling in mobile cloud computing based on MAX-MIN ant system., , , and . Soft Comput., 20 (7): 2611-2625 (2016)Smooth Bi-3 spline surfaces with fewest knots., and . Comput. Aided Des., 43 (2): 180-187 (2011)Efficient multi-tasks scheduling algorithm in mobile cloud computing with time constraints., , , and . Peer-to-Peer Netw. Appl., 11 (4): 793-807 (2018)Tolerable Data Transmission of Mobile Edge Computing Under Internet of Things., , and . IEEE Access, (2019)A General Framework for Detecting Malicious Peers in Reputation-Based Peer-to-Peer Systems., , , and . 3PGCIC, page 463-468. IEEE Computer Society, (2014)Deadline-Aware Task Scheduling in a Tiered IoT Infrastructure., , , , and . GLOBECOM, page 1-7. IEEE, (2017)Characterization of Type I/II g-C3N4/MoS2 van der Waals Heterostructures: A New Theoretical Insight., , , , , , and . J. Chem. Inf. Model., 63 (15): 4708-4715 (August 2023)Jammer Localization in Multi-Hop Wireless Network: A Comprehensive Survey., , , and . IEEE Commun. Surv. Tutorials, 19 (2): 765-799 (2017)Jammer Localization in Multihop Wireless Networks Based on Gravitational Search., , , and . Secur. Commun. Networks, (2018)