Author of the publication

Evolutionary Prisoner's Dilemma Game in Flocks.

, , , and . Complex (2), volume 5 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 1591-1596. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel one-legged robot: cyclic gait inspired by a jumping frog., , and . SMC, page 1412-1417. IEEE, (2001)A hierarchical multicast protocol in mobile IPv6 networks., , , and . Comput. Commun., 30 (1): 144-152 (2006)Simultaneous locomotive assignment and train scheduling on a single-track railway line: A simulation-based optimization approach., , and . Comput. Ind. Eng., (2019)On minimal-order stabilization of minimum phase plants., and . Autom., 38 (7): 1243-1246 (2002)Secret key generation based on private pilot under man-in-the-middle attack., , , , and . Sci. China Inf. Sci., 60 (10): 100307:1-100307:14 (2017)Synchronization and exponential estimates of complex networks with mixed time-varying coupling delays., , and . Int. J. Autom. Comput., 6 (3): 301 (2009)Ipsilateral Lesion Detection Refinement for Tomosynthesis., , , , , , , , and . IEEE Trans. Medical Imaging, 42 (10): 3080-3090 (October 2023)Pattern-reconfigurable antenna-assisted secret key generation from multipath fading channels., , , , , , and . Frontiers Inf. Technol. Electron. Eng., 24 (12): 1803-1814 (December 2023)A Two-Layer Secure Quantization Algorithm for Secret Key Generation With Correlated Eavesdropping Channel., , , , , and . IEEE Access, (2019)CSI-Based Physical Layer Authentication via Deep Learning., , , , and . IEEE Wirel. Commun. Lett., 11 (8): 1748-1752 (2022)