Author of the publication

Component-Based Localization for Wireless Sensor Networks Combining Angle and Distance Information.

, , and . HPCC/EUC, page 2058-2065. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distance outlier detection with a mobile beacon in wireless sensor networks localisation., , and . Int. J. Secur. Networks, 11 (3): 160-166 (2016)Adaptive explicit congestion control based on bandwidth estimation for high bandwidth-delay product networks., , , , , and . Comput. Commun., 36 (10-11): 1235-1244 (2013)Accurate IoT Device Identification based on A Few Network Traffic., , , , and . IWQoS, page 1-10. IEEE, (2023)One more hash is enough: Efficient tag stocktaking in highly dynamic RFID systems., , , and . ICC, page 1-6. IEEE, (2016)LSCDroid: Malware Detection Based on Local Sensitive API Invocation Sequences., , , and . IEEE Trans. Reliability, 69 (1): 174-187 (2020)Let's work together: Fast tag identification by interference elimination for multiple RFID readers., , , and . ICNP, page 1-10. IEEE Computer Society, (2016)SecMCL: A Secure Monte Carlo Localization Algorithm for Mobile Sensor Networks., , , , and . MASS, page 1054-1059. IEEE Computer Society, (2009)Minimizing Movement for Target Coverage in Mobile Sensor Networks., , , , and . ICDCS Workshops, page 194-200. IEEE Computer Society, (2012)MPS: A Multiple Poisoned Samples Selection Strategy in Backdoor Attack., , , , and . TrustCom, page 873-880. IEEE, (2023)A Weight-Bind-Based Safe Top-k Query Processing Scheme in Two-Tiered Sensor Networks., , , , , and . SpaCCS Workshops, volume 10658 of Lecture Notes in Computer Science, page 653-666. Springer, (2017)