Author of the publication

Attack localization task allocation in wireless sensor networks based on multi-objective binary particle swarm optimization.

, , and . J. Netw. Comput. Appl., (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Security Steganography Method for Lossy Compression Gray Scale Image., and . ICIC (1), volume 4681 of Lecture Notes in Computer Science, page 636-645. Springer, (2007)Secure Routing Protocol based on Multi-objective Ant-colony-optimization for wireless sensor networks., , , and . Appl. Soft Comput., (2019)A Location Method for Reliability-Critical Paths Based on Monte Carlo Search Tree., , , and . ML4CS (3), volume 12488 of Lecture Notes in Computer Science, page 100-114. Springer, (2020)A Lightweight Object Tracking Method Based on Transformer., , and . EITCE, page 796-801. ACM, (2023)自动纠错CRO PUF密钥生成方案 (Automatic Error Correction CRO PUF Key Generation Scheme)., and . 计算机科学, 47 (1): 302-308 (2020)A 3-D Hand Gesture Signature Based Biometric Authentication System for Smartphones., , , and . BICT, ICST, (2014)Attack localization task allocation in wireless sensor networks based on multi-objective binary particle swarm optimization., , and . J. Netw. Comput. Appl., (2018)Localization Algorithm in Wireless Sensor Networks Based on Multi-objective Particle Swarm Optimization., , , and . CWSN, volume 501 of Communications in Computer and Information Science, page 223-232. Springer, (2014)An Adaptive Hybrid PSO and GSA Algorithm for Association Rules Mining., , , and . ICCCS, volume 9483 of Lecture Notes in Computer Science, page 469-479. Springer, (2015)Modeling of Security Risk for Industrial Cyber-Physics System under Cyber-attacks., and . ICPS, page 361-368. IEEE, (2021)