2008 | ||
---|---|---|
2 | EE | Scott Craver, Enping Li, Jun Yu, Idris M. Atakli: A Supraliminal Channel in a Videoconferencing Application. Information Hiding 2008: 283-293 |
1 | EE | Idris M. Atakli, Hongbing Hu, Yu Chen, Wei-Shinn Ku, Zhou Su: Malicious node detection in wireless sensor networks using weighted trust evaluation. SpringSim 2008: 836-843 |
1 | Yu Chen | [1] |
2 | Scott Craver | [2] |
3 | Hongbing Hu | [1] |
4 | Wei-Shinn Ku | [1] |
5 | Enping Li | [2] |
6 | Zhou Su | [1] |
7 | Jun Yu | [2] |