![]() |
| 2008 | ||
|---|---|---|
| 2 | EE | Scott Craver, Enping Li, Jun Yu, Idris M. Atakli: A Supraliminal Channel in a Videoconferencing Application. Information Hiding 2008: 283-293 |
| 1 | EE | Idris M. Atakli, Hongbing Hu, Yu Chen, Wei-Shinn Ku, Zhou Su: Malicious node detection in wireless sensor networks using weighted trust evaluation. SpringSim 2008: 836-843 |
| 1 | Yu Chen | [1] |
| 2 | Scott Craver | [2] |
| 3 | Hongbing Hu | [1] |
| 4 | Wei-Shinn Ku | [1] |
| 5 | Enping Li | [2] |
| 6 | Zhou Su | [1] |
| 7 | Jun Yu | [2] |