Author of the publication

A Secure Localization Algorithm Based on Confidence Constraint for Underwater Wireless Sensor Networks.

, , , and . ICISA, volume 424 of Lecture Notes in Electrical Engineering, page 46-49. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Image recovery and recognition: a combining method of matrix norm regularisation., , , , and . IET Image Process., 13 (8): 1246-1253 (2019)A Secure Localization Algorithm Based on Confidence Constraint for Underwater Wireless Sensor Networks., , , and . ICISA, volume 424 of Lecture Notes in Electrical Engineering, page 46-49. Springer, (2017)The general theory for response analysis of fuzzy stochastic dynamical systems., , and . Fuzzy Sets Syst., 83 (3): 369-405 (1996)Deep learning driven real time topology optimisation based on initial stress learning., , , , , , and . Adv. Eng. Informatics, (2022)Research on Multi-disciplinary Integrated Design Method of Remote Sensing Satellites., , and . CSDM Asia / CSDM, page 491. Springer, (2021)Discriminative Topic Mining via Category-Name Guided Text Embedding., , , , , , and . WWW, page 2121-2132. ACM / IW3C2, (2020)Positive Influence Dominating Set in E-Learning Social Networks., , , and . ICWL, volume 7048 of Lecture Notes in Computer Science, page 82-91. Springer, (2011)A self-stabilizing protocol for minimal weighted dominating sets in arbitrary networks., , , and . CSCWD, page 496-501. IEEE, (2013)The groundwater potential assessment system based on cloud computing: A case study in islands region., , , , , , , , , and 1 other author(s). Comput. Commun., (2021)Improved Fuzzy Inference Network and Its Applications in Multi-targets Optimization of the High-Rise Structure Form Selection., , , and . FSKD (1), page 173-179. IEEE Computer Society, (2007)