Author of the publication

Energy-Balanced Separating Algorithm for Cluster-Based Data Aggregation in Wireless Sensor Networks.

, , , and . Int. J. Distributed Sens. Networks, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Combating Good Point Set Scanning-based Self-learning Worms by Using Predators., , , and . Int. J. Netw. Secur., 15 (3): 171-178 (2013)Predators Combat Good Point Set Scanning-Based Self-Learning Worms., , , and . CIS (1), page 418-422. IEEE Computer Society, (2009)Self-attention is What You Need to Fool a Speaker Recognition System., , , , , and . TrustCom, page 929-936. IEEE, (2023)Combating self-learning worms by using predators., , , and . WCNIS, page 607-611. IEEE, (2010)The Research of Security Technology in the Internet of Things., and . CSISE (2), volume 105 of Advances in Intelligent and Soft Computing, page 113-119. Springer, (2011)A Co-evolutionary Algorithm-Based Malware Adversarial Sample Generation Method., , , , and . DSC, page 1-8. IEEE, (2022)A Probability Mapping-Based Privacy Preservation Method for Social Networks., , , , and . UbiSec, volume 2034 of Communications in Computer and Information Science, page 289-303. Springer, (2023)Analysis of SVEIR worm attack model with saturated incidence and partial immunization., , , and . J. Comm. Inform. Networks, 1 (4): 105-115 (2016)Energy-Balanced Separating Algorithm for Cluster-Based Data Aggregation in Wireless Sensor Networks., , , and . Int. J. Distributed Sens. Networks, (2013)A Novel Intrusion Detection System for Malware Based on Time-Series Meta-learning., , , and . ML4CS (1), volume 12486 of Lecture Notes in Computer Science, page 50-64. Springer, (2020)