Author of the publication

Incremental-data stealth-transmission method in DSSS.

, , and . Wirel. Networks, 27 (4): 2441-2449 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Body-to-Body Network Routing Algorithm Based on Link Comprehensive Stability., , , , and . WOCC, page 1-5. IEEE, (2019)A Fast Seamless Acquisition Algorithm for the CL Code of the L2C Navigation Signal., and . Wireless Personal Communications, 97 (1): 789-810 (2017)High resolution blind scanning method for weighted fractional Fourier transform signals., and . IET Signal Process., 16 (8): 992-1001 (2022)A Nonuniform Clustering Routing Algorithm Based on a Virtual Gravitational Potential Field in Underwater Acoustic Sensor Network., , , , and . IEEE Internet Things J., 10 (15): 13814-13825 (August 2023)Design Mechanism for the Fault Diagnosis System of Power Plant Boiler Based on Neural Networks., and . ICKII, page 361-363. IEEE, (2023)A Malicious Code Detection Method Based on FF-MICNN in the Internet of Things., , , , and . Sensors, 22 (22): 8739 (2022)An Energy-Aware Routing Algorithm for Heterogeneous Wireless Sensor Networks., and . HIS (2), page 275-278. IEEE Computer Society, (2009)A Survivability Clustering Algorithm for Ad Hoc Network Based on a Small-World Model., , , , and . Wireless Personal Communications, 84 (3): 1835-1854 (2015)Multi-channel allocation algorithm based on congestion avoidance in wearable wireless sensor network., , , , and . WOCC, page 1-5. IEEE, (2018)FAFS: A Fuzzy Association Feature Selection Method for Network Malicious Traffic Detection., , , and . KSII Trans. Internet Inf. Syst., 14 (1): 240-259 (2020)