Detecting Sybil attacks in image senor network using cognitive intelligence
暂无分享,去创建一个
[1] Ravi Kothari,et al. Fractional-Step Dimensionality Reduction , 2000, IEEE Trans. Pattern Anal. Mach. Intell..
[2] Brian C. Lovell,et al. Person Location Service on the Planetary Sensor Network , 2005 .
[3] Hua Yu,et al. A direct LDA algorithm for high-dimensional data - with application to face recognition , 2001, Pattern Recognit..
[4] Lisa Ann Osadciw,et al. Security: Cross Layer Protocol in Wireless Sensor Network , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[5] David J. Kriegman,et al. Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection , 1996, ECCV.
[6] M. Turk,et al. Eigenfaces for Recognition , 1991, Journal of Cognitive Neuroscience.
[7] Hairong Qi,et al. Revisiting Public-Key Cryptography for Wireless Sensor Networks , 2005, Computer.
[8] Dawu Gu,et al. Scalable PKI model based on location information , 2003, 2003 International Conference on Computer Networks and Mobile Computing, 2003. ICCNMC 2003..
[9] Karsten P. Ulland,et al. Vii. References , 2022 .
[10] Lisa Ann Osadciw,et al. Contourlet Based Image Recovery and De-noising Through Wireless Fading Channels , 2005 .
[11] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[12] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[13] Mauro Birattari,et al. Swarm Intelligence , 2012, Lecture Notes in Computer Science.
[14] Ja-Chen Lin,et al. A new LDA-based face recognition system which can solve the small sample size problem , 1998, Pattern Recognit..
[15] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[16] Lisa Ann Osadciw,et al. Jamming attack detection and countermeasures in wireless sensor network using ant system , 2006, SPIE Defense + Commercial Sensing.
[17] R. Muraleedharan,et al. Cross Layer Denial of Service Attacks in Wireless Sensor Network Using Swarm Intelligence , 2006, 2006 40th Annual Conference on Information Sciences and Systems.
[18] H. Hotelling. Analysis of a complex of statistical variables into principal components. , 1933 .
[19] Lisa Ann Osadciw,et al. Decision Making In a Building Access System Using Swarm Intelligence & POSETS , 2004 .
[20] Konstantinos N. Plataniotis,et al. Face recognition using LDA-based algorithms , 2003, IEEE Trans. Neural Networks.