Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive explicit congestion control based on bandwidth estimation for high bandwidth-delay product networks., , , , , and . Comput. Commun., 36 (10-11): 1235-1244 (2013)One more hash is enough: Efficient tag stocktaking in highly dynamic RFID systems., , , and . ICC, page 1-6. IEEE, (2016)LSCDroid: Malware Detection Based on Local Sensitive API Invocation Sequences., , , and . IEEE Trans. Reliability, 69 (1): 174-187 (2020)Distance outlier detection with a mobile beacon in wireless sensor networks localisation., , and . Int. J. Secur. Networks, 11 (3): 160-166 (2016)Accurate IoT Device Identification based on A Few Network Traffic., , , , and . IWQoS, page 1-10. IEEE, (2023)Minimizing Movement for Target Coverage in Mobile Sensor Networks., , , , and . ICDCS Workshops, page 194-200. IEEE Computer Society, (2012)SecMCL: A Secure Monte Carlo Localization Algorithm for Mobile Sensor Networks., , , , and . MASS, page 1054-1059. IEEE Computer Society, (2009)A Weight-Bind-Based Safe Top-k Query Processing Scheme in Two-Tiered Sensor Networks., , , , , and . SpaCCS Workshops, volume 10658 of Lecture Notes in Computer Science, page 653-666. Springer, (2017)MPS: A Multiple Poisoned Samples Selection Strategy in Backdoor Attack., , , , and . TrustCom, page 873-880. IEEE, (2023)Let's work together: Fast tag identification by interference elimination for multiple RFID readers., , , and . ICNP, page 1-10. IEEE Computer Society, (2016)