Fingerprint
Dive into the research topics of 'Locating malicious nodes for data aggregation in wireless networks'. Together they form a unique fingerprint.- Sort by
- Weight
- Alphabetically
Xiaohua Xu, Qian Wang, Jiannong Cao, Peng Jun Wan, Kui Ren, Yuanfang Chen
Research output: Chapter in book / Conference proceeding › Conference article published in proceeding or book › Academic research › peer-review