From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ADMB: Application-driven multihop broadcast for vehicular networks., , , , and . Int. J. Commun. Syst., (2017)UAV-Enabled Secure Communications via Collaborative Beamforming With Imperfect Eavesdropper Information., , , , , , and . IEEE Trans. Mob. Comput., 23 (4): 3291-3308 (апреля 2024)Mining Correlated Policy Rules with Concept Lattice., , , , and . ISCSCT (1), page 644-647. IEEE Computer Society, (2008)Modeling and simulating traffic congestion propagation in connected vehicles driven by temporal and spatial preference., , , and . Wirel. Networks, 22 (4): 1121-1131 (2016)VIKE: vehicular IKE for context-awareness., , , , and . Wirel. Networks, 21 (4): 1343-1362 (2015)SLNN: A Neural Network for Fuzzy Neural Network's Structure Learning., , and . ISDA (1), page 919-924. IEEE Computer Society, (2006)A New Modeling Algorithm for Router-Level Topology., , and . ICFIE, volume 62 of Advances in Intelligent and Soft Computing, page 1511-1518. (2009)Sparse Synthesis of Concentric Circular Antenna Array via Multi-Objective Evolutionary Computation., , , , , and . VTC Fall, page 1-5. IEEE, (2018)A New Remediation Model Based on Trusted Network., , , , and . CIS (2), page 242-245. IEEE Computer Society, (2008)978-0-7695-3508-1.A Distributed Neural Network Learning Algorithm for Network Intrusion Detection System., , , and . ICONIP (3), volume 4234 of Lecture Notes in Computer Science, page 201-208. Springer, (2006)