From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Multi-Agent Q-Learning Aided Backpressure Routing Algorithm for Delay Reduction., , , и . CoRR, (2017)Anomalies Detection of Routers Based on Multiple Information Learning., , , , и . NaNA, стр. 206-211. IEEE, (2018)DAPV: Diagnosing Anomalies in MANETs Routing With Provenance and Verification., , , , , и . IEEE Access, (2019)Covert Communication in Hybrid Microwave/mmWave A2G Systems with Transmission Mode Selection., , , и . CoRR, (2023)Secure Millimeter-Wave Ad Hoc Communications Using Physical Layer Security., , , и . IEEE Trans. Inf. Forensics Secur., (2022)Similarities and Evolutionary Relationships of COVID-19 and Related Viruses., , , , , , и . CoRR, (2020)Passive User Authentication Utilizing Consecutive Touch Action Features for IIoT Systems., , , и . SciSec, том 13580 из Lecture Notes in Computer Science, стр. 276-284. Springer, (2022)Analysis of SVEIR worm attack model with saturated incidence and partial immunization., , , и . J. Comm. Inform. Networks, 1 (4): 105-115 (2016)Key Management Protocol Based on Finely Granular Multi-level Security Method in Wireless Networks., , , , и . CIS, стр. 731-735. IEEE Computer Society, (2011)Exploring Relay Cooperation for Secure and Reliable Transmission in Two-Hop Wireless Networks, , , и . CoRR, (2012)