Author:
Chen Yingying,Xu Wenyuan,Trappe Wade,Zhang YanYong
Cited by
26 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Optimizing Base Station’s Anonymity with PID-Controlled Fake Packets and Data Aggregation;Arabian Journal for Science and Engineering;2023-10-05
2. Deep Learning-Guided Jamming for Cross-Technology Wireless Networks: Attack and Defense;IEEE/ACM Transactions on Networking;2021-10
3. Jamming Attack Defense;Encyclopedia of Cryptography, Security and Privacy;2021
4. Ensemble Methods for Anomaly Detection Based on System Log;2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing (PRDC);2019-12
5. Improving Base Station Anonymity using Data Funneling and PID Controlled Fake Packets;2019 2nd IEEE Middle East and North Africa COMMunications Conference (MENACOMM);2019-11