Author of the publication

Security Topology Control Method for Wireless Sensor Networks with Node-Failure Tolerance Based on Self-Regeneration.

, , and . EURASIP J. Wireless Comm. and Networking, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A blind watermarking algorithm for 3D mesh models based on vertex curvature., , , and . Journal of Zhejiang University - Science C, 15 (5): 351-362 (2014)Enhancing the Content of the Intrusion Alerts Using Logic Correlation., , and . AWCC, volume 3309 of Lecture Notes in Computer Science, page 137-142. Springer, (2004)Preference and Movement Pattern Similarity-Based Resource Discovery Enhancement Algorithm for Internet of People., , , and . UIC/ATC/ScalCom, page 1149-1154. IEEE Computer Society, (2015)Expression Recognition Based on VLBP and Optical Flow Mixed Features., , and . ICIG, page 933-937. IEEE Computer Society, (2009)A Novel Diversity-Based Semi-Supervised Learning Framework with Related Theoretical Analysis., and . International Journal on Artificial Intelligence Tools, 24 (3): 1550011:1-1550011:20 (2015)Facial expression recognition based on combined HMM., and . IJCAT, 38 (1/2/3): 172-176 (2010)Hierarchical Face Recognition Based on SVDD and SVM., , and . ESIAT (2), page 692-695. IEEE Computer Society, (2009)Modelling intrusion for intrusion tolerance system by correlating alerts from IDS sensor., , and . IJAAC, 1 (1): 100-114 (2007)A zero-watermarking scheme for three-dimensional mesh models based on multi-features., and . Multimedia Tools Appl., 78 (19): 27001-27028 (2019)Security Topology Control Method for Wireless Sensor Networks with Node-Failure Tolerance Based on Self-Regeneration., , and . EURASIP J. Wireless Comm. and Networking, (2010)