Author of the publication

Research on hidden malicious user detection problem.

, and . Security and Communication Networks, 7 (6): 958-963 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An efficient detection scheme for urban traffic condition using volunteer probes., , , , , and . ICPADS, page 768-773. IEEE Computer Society, (2014)PPAS: privacy protection authentication scheme for VANET., , , and . Cluster Computing, 16 (4): 873-886 (2013)Personas in O2O Mobile Healthcare: A Method for Identifying and Creating User Groups., , , , , and . ICEBE, page 100-107. IEEE Computer Society, (2016)Ice Velocity Variations of the Polar Record Glacier (East Antarctica) Using a Rotation-Invariant Feature-Tracking Approach., , and . Remote Sensing, 10 (1): 42 (2018)Aurora Image Classification Based on Multi-Feature Latent Dirichlet Allocation., , , , and . Remote Sensing, 10 (2): 233 (2018)3D visual simulation of individual and crowd behavior in earthquake evacuation., , , , , and . Simulation, (2019)D2D-enabled wireless caching using Stackelberg game., , , and . WCSP, page 1-5. IEEE, (2016)Interference Coordination and Resource Allocation Planning With Predicted Average Channel Gains for HetNets., , , and . IEEE Access, (2018)A low-complexity subcarrier-power allocation scheme for frequency-division multiple-access systems., , and . IEEE Trans. Wireless Communications, 9 (5): 1571-1576 (2010)Research on hidden malicious user detection problem., and . Security and Communication Networks, 7 (6): 958-963 (2014)