Author of the publication

Reliability Analysis of Large-Scale Adaptive Weighted Networks.

, , , , , , and . IEEE Trans. Inf. Forensics Secur., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling malware propagation in complex networks based on cellular automata., , and . APCCAS, page 259-263. IEEE, (2008)Reference-shifted DCSK modulation scheme for secure communication., , , and . ICNC, page 1073-1076. IEEE Computer Society, (2017)A zero-watermarking image authentication scheme using Zernike moment and extreme learning machine., and . WCSP, page 1-5. IEEE, (2011)Energy efficiency analysis for cognitive radio network with data collision., , , , and . WCSP, page 1-6. IEEE, (2014)Application of DeepWalk Based on Hyperbolic Coordinates on Unsupervised Clustering., , , , and . SciSec, volume 11933 of Lecture Notes in Computer Science, page 106-118. Springer, (2019)Bifurcation and Oscillatory Dynamics of Delayed Cyclic Gene Networks Including Small RNAs., , and . IEEE Trans. Cybern., 49 (3): 883-896 (2019)Optimal distributed stochastic mirror descent for strongly convex optimization., , , and . Autom., (2018)A Verifiable Multi-recipient Encryption Scheme from Multilinear Maps., , and . 3PGCIC, page 151-156. IEEE Computer Society, (2014)Modeling and Experiment of Three-cavity Soft Manipulator., , , and . CCIS, page 1018-1022. IEEE, (2018)Cooperative FPT-based spectrum sensing algorithm with decision fusion., , , , and . WCSP, page 1-5. IEEE, (2014)