![]() |
| 2008 | ||
|---|---|---|
| 3 | EE | Kai Li, Naijie Gu, Kun Bi, Hongzhu Ji: Network Security Evaluation Algorithm Based on Access Level Vectors. ICYCS 2008: 1538-1544 |
| 2006 | ||
| 2 | EE | Kun Bi, Kun Tu, Naijie Gu, Wan Lin Dong, Xiaohu Liu: Topological Hole Detection in Sensor Networks with Cooperative Neighbors. ICSNC 2006: 31 |
| 1 | EE | Kun Tu, Kun Bi, Naijie Gu, Wan Li Dong, Xiaohu Liu: Mac Address Assignment In Wireless Sensor Networks: A Mixed Strategy Game Approach. ICSNC 2006: 41 |
| 1 | Wan Li Dong | [1] |
| 2 | Wan Lin Dong | [2] |
| 3 | Naijie Gu | [1] [2] [3] |
| 4 | Hongzhu Ji | [3] |
| 5 | Kai Li | [3] |
| 6 | Xiaohu Liu | [1] [2] |
| 7 | Kun Tu | [1] [2] |