Author of the publication

Intrusion Detection Based on k-Coverage in Mobile Sensor Networks With Empowered Intruders.

, , , , , and . IEEE Trans. Vehicular Technology, 67 (12): 12109-12123 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cross-layer design and performance comparison of HARQ schemes with imperfect CSI in cooperative relay networks., , , and . CHINACOM, page 356-360. IEEE Computer Society, (2011)RFID Technology and its Perspective Analysis with KERGM(1, 1) Model., , and . JCP, 3 (7): 9-15 (2008)An algebraic characterization of equivalent preferential models., and . J. Symb. Log., 72 (3): 803-833 (2007)Two Efficient Implementation Forms of Unscented Kalman Filter., and . Control and Intelligent Systems, (2011)An approach of laser-based vehicle monitor., , , , and . Applied Mathematics and Computation, 185 (2): 953-962 (2007)Joint optimization of performance and economics in inter-domain traffic engineering., , , , and . GLOBECOM Workshops, page 231-236. IEEE, (2014)A projection-based image quality measure., , , , and . Int. J. Imaging Systems and Technology, 18 (2-3): 94-100 (2008)Human gait recognition at sagittal plane., , and . Image Vision Comput., 25 (3): 321-330 (2007)Selection of Reverse-logistics Servicer for Electronic Products with Fuzzy Comprehensive Evaluation Method., , and . Grey Systems: T&A, 2 (2): 207-216 (2012)Image quality assessment using a SVD-based structural projection., , , and . Sig. Proc.: Image Comm., 29 (3): 293-302 (2014)