Author of the publication

Effectiveness Analysis of UAV Offensive Strategy with Unknown Adverse Trajectory.

, , , , , , , , , and . WASA (3), volume 12939 of Lecture Notes in Computer Science, page 68-76. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An instructional design of open source networking laboratory and curriculum., and . SIGITE Conference, page 37-42. ACM, (2009)Developing IP telephony laboratory and curriculum with private cloud computing., , and . SIGITE Conference, page 107-112. ACM, (2011)Singular vector sparse reconstruction for image compression., , , , , , and . Comput. Electr. Eng., (2021)Design and implement a networking curriculum in light of ACM IT curriculum recommendations and bloom's taxonomy., and . SIGITE Conference, page 155-156. ACM, (2010)A lab implementation of SYN flood attack and defense., and . SIGITE Conference, page 57-58. ACM, (2008)Subspace transform induced robust similarity measure for facial images., , , , , and . Frontiers Inf. Technol. Electron. Eng., 21 (9): 1334-1345 (2020)Building a CISCO-feel linux router to enable students learn and configure dynamic routing protocols., and . SIGITE Conference, page 271-272. ACM, (2007)Effectiveness Analysis of UAV Offensive Strategy with Unknown Adverse Trajectory., , , , , , , , , and . WASA (3), volume 12939 of Lecture Notes in Computer Science, page 68-76. Springer, (2021)Poster Abstract: Iterative Trajectory Optimization for Dual-UAV Secure Communications., , , , , , , , and . IoTDI, page 260-261. IEEE, (2020)