Author:
Zheng Li,Yu Gang,Zheng Yuntian
Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Modeling and Simulation,Information Systems,Signal Processing,Theoretical Computer Science,Control and Systems Engineering
Reference25 articles.
1. Qiu, M., Xue, C., Shao, Z., et al. (2006). Efficient algorithm of energy minimization for heterogeneous wireless sensor network. IEEE EUC, 25–34.
2. Niu, J., Gao, Y., Qiu, M., & Ming, Z. (2012). Selecting proper wireless network interfaces for user experience enhancement with guaranteed probability. JPDC, 72(12), 1565–1575.
3. Zhang, Y. L. (2022). Network security data visualization fusion analysis method based on multivariate heterogeneous. Electronic Technology and Software Engineering, (15), 5–8.
4. Qiu, H., Qiu, M., & Lu, R. (2019). Secure V2X communication network based on intelligent PKI and edge computing. IEEE Network, 34(2), 172–178.
5. Qiu, H., Zeng, Y., et al. (2021). Deepsweep: An evaluation framework for mitigating DNN backdoor attacks using data augmentation. ACM Asia Conference on Computer and Communications Security.