Author of the publication

Secure Time Synchronization in WirelessSensor Networks: A MaximumConsensus-Based Approach.

, , , and . IEEE Trans. Parallel Distrib. Syst., 25 (4): 1055-1065 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Cao, Xianghui
add a person with the name Cao, Xianghui
 

Other publications of authors with the same name

Secure Time Synchronization in WirelessSensor Networks: A MaximumConsensus-Based Approach., , , and . IEEE Trans. Parallel Distrib. Syst., 25 (4): 1055-1065 (2014)Distributed formation control with pose estimation in multi-robot systems., , , , and . ICCA, page 834-839. IEEE, (2013)Building-Environment Control With Wireless Sensor and Actuator Networks: Centralized Versus Distributed., , , and . IEEE Trans. Industrial Electronics, 57 (11): 3596-3605 (2010)Cooperative Message Authentication in Vehicular Cyber-Physical Systems., , , , and . IEEE Trans. Emerging Topics Comput., 1 (1): 84-97 (2013)A Systematic Study of Maximal Scheduling Algorithms in Multiradio Multichannel Wireless Networks., , , and . IEEE/ACM Trans. Netw., 23 (4): 1342-1355 (2015)Optimal jamming attack schedule for remote state estimation with two sensors., , , and . J. Franklin Institute, 355 (14): 6859-6876 (2018)Ghost-in-the-Wireless: Energy Depletion Attack on ZigBee., , , , , and . CoRR, (2014)Joint Optimization of Scheduling and Power Control in Wireless Network: Multi-Dimensional Modeling and Decomposition., , , , and . CoRR, (2017)Optimal Jamming Attack Strategy Against Wireless State Estimation: A Game Theoretic Approach., , , and . IECON, page 5989-5995. IEEE, (2018)Secure key establishment for Device-to-Device communications., , , , , and . GLOBECOM, page 336-340. IEEE, (2014)