Author of the publication

A Study and Simulation Research of Blackhole Attack on Mobile AdHoc Network.

, , and . CNS, page 1-6. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Self-assisted complete analysis of three-photon hyperentangled Greenberger-Horne-Zeilinger states with nitrogen-vacancy centers in microcavities., , and . Quantum Inf. Process., 17 (7): 172 (2018)CHECK-IT: An international internship center on improving the professional skills and intercultural communication competence in IT for undergraduates., , , , , and . ICCSE, page 753-756. IEEE, (2016)Real-Time Simulation of Hybrid Modular Multilevel Converters Using Shifted Phasor Models., , , , and . IEEE Access, (2019)Spanning trees whose stems have at most k leaves., and . Ars Comb., (2014)An Empirical Comparison of FAISS and FENSHSES for Nearest Neighbor Search in Hamming Space., , and . CoRR, (2019)A Survey on Future Internet Security Architectures., , and . IEEE Access, (2016)Heterogeneous Data Storage Management with Deduplication in Cloud Computing., , , and . IEEE Trans. Big Data, 5 (3): 393-407 (2019)Research on Offline Palmprint Image Enhancement., , , , and . ICIP (1), page 541-544. IEEE, (2007)Detection of Application-Layer Tunnels with Rules and Machine Learning., , and . SpaCCS, volume 11611 of Lecture Notes in Computer Science, page 441-455. Springer, (2019)The Minimum Sampling Rate and Sampling Duration When Applying Geolocation Data Technology to Human Activity Monitoring., , and . AIME, volume 11526 of Lecture Notes in Computer Science, page 233-238. Springer, (2019)