From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cloud Computing Task Scheduling Based on Improved Differential Evolution Algorithm., , , , , и . NaNA, стр. 458-463. IEEE, (2019)Diamond Sketch: Accurate Per-flow Measurement for Big Streaming Data., , , , , и . IEEE Trans. Parallel Distributed Syst., 30 (12): 2650-2662 (2019)QoS-Aware Secure Routing Design for Wireless Networks With Selfish Jammers., , , , , и . IEEE Trans. Wirel. Commun., 20 (8): 4902-4916 (2021)Analysis of SVEIR worm attack model with saturated incidence and partial immunization., , , и . J. Comm. Inform. Networks, 1 (4): 105-115 (2016)Multi-Agent Q-Learning Aided Backpressure Routing Algorithm for Delay Reduction., , , и . CoRR, (2017)Anomalies Detection of Routers Based on Multiple Information Learning., , , , и . NaNA, стр. 206-211. IEEE, (2018)DAPV: Diagnosing Anomalies in MANETs Routing With Provenance and Verification., , , , , и . IEEE Access, (2019)Secure Millimeter-Wave Ad Hoc Communications Using Physical Layer Security., , , и . IEEE Trans. Inf. Forensics Secur., (2022)Opportunistic Wiretapping/Jamming: A New Attack Model in Millimeter-Wave Wireless Networks., , , , , , и . CoRR, (2022)Passive User Authentication Utilizing Consecutive Touch Action Features for IIoT Systems., , , и . SciSec, том 13580 из Lecture Notes in Computer Science, стр. 276-284. Springer, (2022)