Author of the publication

Cooperative Transmission Against Impersonation Attack Using Inter-Session Interference in Two-Hop Wireless Networks.

, , , and . TrustCom/BigDataSE/ISPA (1), page 104-110. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Forecasting of Grain Pile Temperature From Meteorological Factors Using Machine Learning., , , , and . IEEE Access, (2019)Lab performance analysis of a 4G LTE prototype., , , , , , and . WCNC, page 1244-1249. IEEE, (2009)Keyword-Aware Dominant Route Search for Various User Preferences., , , and . DASFAA (2), volume 9050 of Lecture Notes in Computer Science, page 207-222. Springer, (2015)Detecting false messages in vehicular ad hoc networks based on a traffic flow model., , , and . IJDSN, (2020)Feature engineering and tree modeling for author-paper identification challenge., , , , and . KDD Cup, page 5:1-5:8. ACM, (2013)Improved differential evolution algorithm used for load distribution of hot strip rolling., and . BIC-TA, page 526-530. IEEE, (2010)Use of Artificial Neural Networks in Near-Infrared Spectroscopy Calibrations for Predicting Glucose Concentration in Urine., , , and . ICIC (1), volume 5226 of Lecture Notes in Computer Science, page 1040-1046. Springer, (2008)DcTr: Noise-robust point cloud completion by dual-channel transformer with cross-attention., , , and . Pattern Recognit., (2023)Deep multi-view spectral clustering via ensemble., , and . Pattern Recognit., (December 2023)Double-event-triggered cooperative maximum correntropy estimation over wireless sensor networks., , , , , and . Signal Process., (2023)