[1] 李平,孫利 民,吳佳英,方慶,謝晉陽(yáng),周博翔. 基于可離散處理的 RFID 防碰撞混雜算法研究[J]. 通 信學(xué)報(bào),2013,34(8):10-17. (EIAccession number:20133816756906)
[2] 李平,陽(yáng)武,謝晉陽(yáng),朱紅松,張永光,李曉鋒. 基于加權(quán)擬合分析的 WSN 安全數(shù)據(jù)融合機(jī)制研 究[J]. 軟件學(xué)報(bào),2013,24(S1):108-116. (EI Accession number: 20135217145026)
[3] 李平,陽(yáng)武,吳佳英,胡海羅.基于相似度預(yù)測(cè)的WSN數(shù)據(jù)收集算法,軟件學(xué)報(bào),2014/No:25(Suppl.(1)):93-102
[4] 李平,林亞平,曾瑋妮.傳感器網(wǎng)絡(luò)安全研究(英文)[J]. 軟件學(xué)報(bào),2006, 17(12): 2577-2588.(EI Accession number:20070310372722)
[5] Q. Tang, K. Yang, P. Li, J. Zhang, Y. Luo and B. Xiong. An Energy Efficient MCDS Construction Algorithm for Wireless Sensor Networks [J], EURASIP Journal on Wireless Communications and Networking. 2012:83-97.(SCI 000316399600001)
[6] G. Zhang, P. Li, D. Zhou, K. Yang, E. Ding. Optimal Power Control Mechanisms for Wireless Cooperative Relaying Networks: A Cooperative Game-Theoretic Approach [J], Wiley
I
.
J. of Communication Systems (IJCS), vol.26(2): 139–275.(SCI: 000326025500004)
[7] Ping Li, Yaping Lin. A Further Approach on Hypercube-Based Pairwise Key Establishment in Sensor Networks[C]. Ubiquitous Intelligence and Computing, 2006, Vol.4159: 835-844.(SCIISI: 000240542600085)
[8] Li P, Jiang L L, Wu J Y, et al. RSA Extended Modulus Attacks and Solutions In a Kind of Fair Exchange Protocols[C]. Proceedings of Networking and Mobile Computing, Springer-Verlag LNCS vol.3619:1094-1104. (SCI ISI: 000231116600112)
[9] Li P, Lin Y P, Wu J Y. Two Approaches on Pairwise Key Path Establishment for Sensor Networks[C]. Proceedings of 2007 IFIP International Conference on Embedded and Ubiquitous Computing, Springer-Verlag, LNCS vol.4809: 770-780. (SCI)
[10] Li Ping, Lin Yaping, Wu Jiaying, et al. Analysis on Node's Pairwise Key Path Construction in Sensor Networks[C]. Proceedings of 10th IEEE International Conference on High Performance Computing and Communications, 2008:506-512. (EI Accession number: 20084811737755))
[11] Ping Li, Limin Sun, Wu Yang, et al. False Data Attacks Judgment Based on Consistency
Loop
Model in Wireless Sensor Networks[C]. The
Forth
International on Swarm Intell,2013:308-315. (EI Accession number: 20134116822250)
[12] Li Ping, Wu Jiaying, Xue Jingming. Research on Pairwise Key Establishment for Cluster Heads in Sensor Networks[C]. 5th International Conference on Embedded and Ubiquitous, 2008:216-221. (EI Accession number: 20091412011337)
[13] Ping Li, Xian Wang, Jiaying Wu. Implementation Technology of Environmental Data Collection System Based on WSN[C]. 2nd International Conference on Artificial Intelligence, 2011:1176-1179. (EI Accession number: 20114014387803)
[14] Ping Li, Xianping Li, Jiaying Wu. Design and Implementation of Image Monitoring System Based on Short-range Wireless Communication[C]. 2nd International Conference on Artificial Intelligence, 2011:2939-2942. (EI Accession number: 20114014387896)
[15] Lin Ning, Ping Li. Clustering Routing Protocol Based on Base Station Authentication with TLEACH in WSN[C]. 2013 2nd International Conference on Energy and Environmental Protection, 2013. (EI Accession number: 20134016818908)
[16] Haofan Liu, Ping Li. An Approach on Optimization of ZigBee Network Routing Algorithm[C]. 2013 International Conference on Precision Mechanical Instruments and Measurement Technology, 2013: 3107-3113. (EI Accession number: 20133616698793)
[17] Ping Li, Jin Zhang, YaPing Lin. Multipath-based Secure Routing Algorithm for Sensor Network[C]. The Sixth World Congress on Intelligent Control and Automation, 2006:4133-4136. (EI Accession number: 20071510542008)
[18] Ping Li, Limin Sun, Qing Fang, et al. An Study of Indoor Localization Algorithm Based on Imperfect Signal Coverage in Wireless Networks[C]. The
Forth
International on Swarm Intell,2013:3107-3113. (EI Accession number: 20134116822252)
|