[1] |
HUI Hui, GOU Bo, WANG Ying.
Secure Transmission Scheme for Successive Relaying Networks Under Eavesdropping Environment
[J]. Computer Engineering and Applications, 2021, 57(4): 77-82.
|
[2] |
GONG Junhui, HU Xiaohui, DU Yongwen.
Research on Selection of Optimal Defense Strategy Based on Evolutionary Game
[J]. Computer Engineering and Applications, 2021, 57(13): 116-123.
|
[3] |
XU Xinjian, QIU Runhe.
Physical Layer Security of Cognitive Relay Network
[J]. Computer Engineering and Applications, 2020, 56(6): 79-85.
|
[4] |
MENG Yuan, TU Shanshan, YU Jinliang.
Detection Scheme of Impersonation Attack Based on DQL Algorithm in Fog Computing
[J]. Computer Engineering and Applications, 2020, 56(10): 63-68.
|
[5] |
LIU Xiaochen, GAO Yuanyuan, XI Heping, ZHOU Mi.
Secure Energy Efficiency Optimization for RF-Powered Wireless Sensor Networks
[J]. Computer Engineering and Applications, 2019, 55(21): 122-128.
|
[6] |
LI Hong, ZHU Xuan, LIU Yunfei, LI Junhui.
Improved TORA Protocol with Low Overhead and Load Balancing
[J]. Computer Engineering and Applications, 2019, 55(11): 67-73.
|
[7] |
DU Yongwen, WANG Zhangmin, HU Xiaohui, XU Ning.
A Survey on Software-Defined Wireless Sensor Network
[J]. Computer Engineering and Applications, 2019, 55(1): 1-8.
|
[8] |
WEI Yu, SONG Tian.
Lightweight and robust data reduction algorithms for Wireless Sensor Network
[J]. Computer Engineering and Applications, 2018, 54(3): 100-108.
|
[9] |
QI Gang, ZHENG Lin.
Transmission protocol based on network coding for Wireless Sensor Networks of power lines system
[J]. Computer Engineering and Applications, 2018, 54(12): 86-92.
|
[10] |
ZHU Changju, WU Jiaxin, SONG Haisheng, YANG Hongwu.
Bounding-Box localization algorithm based on limit partition of estimated rectangle
[J]. Computer Engineering and Applications, 2017, 53(18): 84-88.
|
[11] |
SONG Haisheng, ZHU Changju, YANG Hongwu, WU Jiaxin.
Improvement of virtual anchor node strategy for Grid-Scan location algorithm
[J]. Computer Engineering and Applications, 2017, 53(16): 84-88.
|
[12] |
YANG Nan1, CHEN Yuanbo2, WANG Yanjie2, LI Qing2.
Multipath transmission protocol based on degree-constrained shortest path tree
[J]. Computer Engineering and Applications, 2017, 53(11): 126-130.
|
[13] |
GAO Guangyong1,2, YAO Shimao1,2, ZHOU Caixue1,2, CUI Zongmin1,2.
Reversible data hiding scheme for authentication of Wireless Sensor Network
[J]. Computer Engineering and Applications, 2017, 53(10): 124-131.
|
[14] |
JIANG Zhiying1, CHEN Yong2, HU Bing1, SUN Zhixin1.
Research on time synchronization algorithm for Wireless Sensor Networks
[J]. Computer Engineering and Applications, 2017, 53(1): 1-8.
|
[15] |
DANG Xiaochao1,2, PU Shiqiang1, HAO Zhanjun1,2.
Node scheduling algorithm for three-dimensional wireless sensor network
[J]. Computer Engineering and Applications, 2016, 52(7): 117-121.
|