Author of the publication

Random-walk based approach to detect clone attacks in wireless sensor networks.

, , , , and . IEEE J. Sel. Areas Commun., 28 (5): 677-691 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Recognizing Brain States Using Deep Sparse Recurrent Neural Network., , , , , , , and . IEEE Trans. Medical Imaging, 38 (4): 1058-1068 (2019)ADSS: An approach to determining semantic similarity., , , and . Adv. Eng. Softw., 37 (2): 129-132 (2006)Modeling Brain Diverse and Complex Hemodynamic Response Patterns via Deep Recurrent Autoencoder., , , , , , and . IEEE Trans. Cogn. Dev. Syst., 12 (4): 733-743 (2020)Nonlinear chemical process monitoring using decentralized kernel principal component analysis and Bayesian inference., , , , and . ASCC, page 1487-1492. IEEE, (2017)A system-on-chip and paper-based inkjet printed electrodes for a hybrid wearable bio-sensing system., , , , and . EMBC, page 5026-5029. IEEE, (2012)Evaluation of non-contact flexible electrodes connected with a customized IC-steps towards a fully integrated ECG sensor., , and . NORCHIP, page 1-5. IEEE, (2013)Target guiding self-avoiding random walk with intersection algorithm for minimum exposure path problem in wireless sensor networks., , , , , and . EURASIP J. Wireless Comm. and Networking, (2018)Coverage Analysis for Wireless Sensor Networks., , , , and . MSN, volume 3794 of Lecture Notes in Computer Science, page 711-720. Springer, (2005)Using Outlier Detection to Reduce False Positives in Intrusion Detection., and . NPC Workshops, page 26-33. IEEE Computer Society, (2008)Adaptive memory coherence algorithms in DSVM., , , and . J. Comput. Sci. Technol., 9 (4): 365-372 (1994)