Author of the publication

A Secure Localization Algorithm Based on Confidence Constraint for Underwater Wireless Sensor Networks.

, , , and . ICISA, volume 424 of Lecture Notes in Electrical Engineering, page 46-49. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Online commercial intention detection framework based on web pages., , , and . Int. J. Comput. Sci. Eng., 12 (2/3): 176-185 (2016)Research and Application of SF6 Small Signal Detection System Based on Soft Threshold Denoising Method., , , , and . ISEEIE, page 152-154. ACM, (2021)Decision Model for "Going Global" of China's Electric Power Technology and Equipment., , and . ITQM, volume 162 of Procedia Computer Science, page 623-627. Elsevier, (2019)An Automatic Method for Fast Synaptic Signal Detection and Count., , , , and . ICBDT, page 178-182. ACM, (2022)Adaptive error control for fine-granular-scalability video coding over IEEE 802.11 wireless LANs., , , , and . ICME, page 669-672. IEEE Computer Society, (2003)A bi-level optimization model of LRP in collaborative logistics network considered backhaul no-load cost., , and . Soft Comput., 22 (16): 5385-5393 (2018)D-Grid: An In-Memory Dual Space Grid Index for Moving Object Databases., , and . MDM, page 252-261. IEEE Computer Society, (2016)Effective Software Fault Localization Using an RBF Neural Network., , , , and . IEEE Trans. Reliab., 61 (1): 149-169 (2012)STRuB: A Self-Defense Trust Management Model Based on Blockchain for VANETs., , , , , , and . ICBCT, page 21-28. ACM, (2023)Multi-objective artificial bee colony algorithm for multi-stage resource leveling problem in sharing logistics network., , and . Comput. Ind. Eng., (2020)