Author of the publication

Protocol Formats Reverse Engineering Based on Association Rules in Wireless Environment.

, , , , and . TrustCom/ISPA/IUCC, page 134-141. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Kernel-based data fusion improves the drug-protein interaction prediction., , , and . Comput. Biol. Chem., 35 (6): 353-362 (2011)Investigations on smart card-based secure protocols for autenticated key establishment in Digital pay-TV systems., , , and . IEEE ICCI, page 538-541. IEEE Computer Society, (2009)Object tracking via dense SIFT features and low-rank representation., , , and . Soft Comput., 23 (20): 10173-10186 (2019)Collaborative model based UAV tracking via local kernel feature., , , , and . Appl. Soft Comput., (2018)State estimation for nonlinear discrete-time fractional systems: A Bayesian perspective., , , , and . Signal Process., (2019)A Thin-Cloud Removal Approach Combining the Cirrus Band and RTM-Based Algorithm for Landsat-8 OLI Data., and . IGARSS, page 1434-1437. IEEE, (2019)A Revised ICA Algorithm to Remove Cirrus Cloud Effects in Spectral Data of Landsat-8 Bands 1-7., and . IGARSS, page 1430-1433. IEEE, (2019)Impact of the Variation of Observable Areas on Landslide Study Using Insar Technique., and . IGARSS, page 9606-9609. IEEE, (2019)Virtual neighbor based connectivity preserving of multi-agent systems with bounded control inputs in the presence of unreliable communication links., , , , and . Autom., 49 (5): 1261-1267 (2013)Verification of hidden speaker behind transformation disguised voices., , and . Digit. Signal Process., (2015)