Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge., , , , and . INFOCOM, IEEE, (2004)Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks., , and . Pervasive Mob. Comput., 2 (2): 159-186 (2006)A novel SCR-LDMOS for high voltage ESD protection., and . ASICON, page 1-4. IEEE, (2015)A fault tolerant and energy efficient routing protocol for urban sensor networks., , and . Infoscale, volume 304 of ACM International Conference Proceeding Series, page 27. ACM, (2007)HQuad: Statistics of Hamiltonian Cycles in Wireless Rechargeable Sensor Networks., , , and . ICT, page 549-553. IEEE, (2018)Failure Rate Minimization with Multiple Function Unit Scheduling for Heterogeneous WSNs., , and . GLOBECOM, page 5213-5217. IEEE, (2008)Detection of Fabricated CTS Packet Attacks in Wireless LANs., and . QSHINE, volume 74 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 105-115. Springer, (2010)A novel entropy optimized kernel least-mean mixed-norm algorithm., , , , , and . IJCNN, page 1716-1722. IEEE, (2016)A spectrum smoothing method for speaker verification., , , and . APSIPA, page 1291-1295. IEEE, (2015)Bayesian method for identification of constrained nonlinear processes with missing output data., and . ACC, page 96-101. IEEE, (2011)