Skip to main content

and
  1. No Access

    Living Reference Work Entry In depth

    Machine Learning in Secured Computing

    **angyu Wei, Xu Han, Wei Wang in Encyclopedia of Cryptography, Security and Privacy

  2. No Access

    Reference Work Entry In depth

    Long-Term Quality of Protection

    Wei Wang, Tao Jiang, Qian Zhang in Encyclopedia of Wireless Networks (2020)

  3. No Access

    Reference Work Entry In depth

    Pilot Spoofing Attack

    Wei Wang in Encyclopedia of Wireless Networks (2020)

  4. No Access

    Living Reference Work Entry In depth

    Pilot Spoofing Attack

    Wei Wang in Encyclopedia of Wireless Networks

  5. No Access

    Living Reference Work Entry In depth

    Long-Term Quality of Protection

    Wei Wang, Tao Jiang, Qian Zhang in Encyclopedia of Wireless Networks

  6. No Access

    Reference Work Entry In depth

    Fault-Tolerant Connected Dominating Set

    Donghyun Kim, Wei Wang, Weili Wu, Alade O. Tokuta in Encyclopedia of Algorithms (2016)

  7. No Access

    Living Reference Work Entry In depth

    Fault-Tolerant Connected Dominating Set

    Donghyun Kim, Wei Wang, Weili Wu, Alade O. Tokuta in Encyclopedia of Algorithms