Author of the publication

A Multi-Scale CNN Framework for Wireless Technique Classification in Internet of Things

, , , , and . IEEE Internet of Things Journal, 4662 (c): 9--10 (2021)
DOI: 10.1109/JIOT.2021.3132652

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Half-sweep RSOR iteration with three-point linear rational finite difference scheme for solving first-order Fredholm integro-differential equations., , and . Int. J. Comput. Sci. Math., 17 (2): 182-194 (2023)Impact of Limited Feedback on Multiple Relay Zero-Forcing Precoding Systems., , and . ICC, page 4992-4997. IEEE, (2008)How to Protect Personal Information against Keyloggers., , and . IMSA, page 275-280. IASTED/ACTA Press, (2005)An adaptive method to identify disk cluster size based on block content., , , , and . Digital Investigation, 7 (1-2): 48-55 (2010)Towards selecting optimal features for flow statistical based network traffic classification., , , and . APNOMS, page 479-482. IEEE, (2015)A dynamic association control mechanism for bus networks., , , , and . ISCIT, page 244-249. IEEE, (2011)Detecting bursts in P2P based semi-autonomous underwater acoustic sensor networks., and . ISCIT, page 238-243. IEEE, (2011)MASS: Multiple ASSociation Scheme in IEEE 802.11 Wireless Mesh Networks., , , and . WICON, volume 98 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 204-215. Springer, (2011)PPtaxi: Non-stop Package Delivery via Multi-hop Ridesharing., , , , , and . CoRR, (2018)Robust Steganography by Modifying Sign of DCT Coefficients., , , and . IEEE Access, (2019)