Author of the publication

Secure Data Delivery with Linear Network Coding for Multiple Multicasts with Multiple Streams in Internet of Things.

, , , and . Security and Communication Networks, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Focused Crawling Guided by Link Context., , and . Artificial Intelligence and Applications, page 365-369. IASTED/ACTA Press, (2006)Generalized geometry-based optimal power control in wireless networks., , , , and . SECON, page 614-622. IEEE, (2012)A fast pseudo-stochastic sequential cipher generator based on RBMs., , , , and . Neural Computing and Applications, 30 (4): 1277-1287 (2018)Recognition of protein allosteric states and residues: Machine learning approaches., , and . Journal of Computational Chemistry, 39 (20): 1481-1490 (2018)A Simple Approach of Gaussian Approximation for Channel Capacity in Multiple-Antenna Systems., , , , and . VTC Fall, page 1-5. IEEE, (2011)Effective Labeled Time Slots Based D2D Transmission in Cellular Downlink Spectrums., , , and . VTC Spring, page 1-5. IEEE, (2010)Exploiting scalar effects of MIMO detection in could base-station: Feasible scheme and universal significance., , , , , and . GLOBECOM Workshops, page 216-221. IEEE, (2012)When is FDMA Sum-Rate Optimal in 2x2 Gaussian Interference Channel?, , , and . IEEE Communications Letters, 18 (4): 529-531 (2014)A weighted throttled load balancing approach for virtual machines in cloud environment., , and . IJCSE, 11 (4): 402-408 (2015)Utility-based resource allocation in uplink of OFDMA-based cognitive radio networks., , , , and . Int. J. Communication Systems, 23 (2): 252-274 (2010)