From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Distributed Detection in Mobile Access Wireless Sensor Networks under Byzantine Attacks., , , и . IEEE Trans. Parallel Distributed Syst., 25 (4): 950-959 (2014)Reliable data fusion in wireless sensor networks under Byzantine attacks., , и . MILCOM, стр. 810-815. IEEE, (2011)An Automatic Attribute Based Access Control Policy Extraction from Access Logs., , , и . CoRR, (2020)Adaptive ABAC Policy Learning: A Reinforcement Learning Approach., , и . CoRR, (2021)Identifying Malicious Nodes in Multihop IoT Networks Using Diversity and Unsupervised Learning., , , и . ICC, стр. 1-6. IEEE, (2018)Diversity for Detecting Routing Attacks in Multihop Networks., , и . ICNC, стр. 712-717. IEEE Computer Society, (2018)Cooperative sensing in cognitive networks under malicious attack., , , и . ICASSP, стр. 3004-3007. IEEE, (2011)Reliable Cooperative Sensing in Cognitive Networks - (Invited Paper)., , и . WASA, том 7405 из Lecture Notes in Computer Science, стр. 206-217. Springer, (2012)Architecture design of mobile access coordinated wireless sensor networks., , , и . ICC, стр. 1720-1724. IEEE, (2013)Reliable OFDM system design under hostile multi-tone jamming., , и . GLOBECOM, стр. 4290-4295. IEEE, (2012)