Current location - Education and Training Encyclopedia - Resume - Articles published by Huang Jie
Articles published by Huang Jie
Key pre-distribution scheme for large-scale wireless sensor networks based on public key polynomial. Temporary & Wireless Sensor Network, 20 12, 16( 1-3): 45-64.

(2) Huang Jun, Huang, a security key distribution scheme for hybrid wireless sensor networks based on energy efficiency, Security and Communication Network, 2014,7 (8):1189-198.

(3) Huang Jie, Huang Bei, a key distribution scheme based on public key in wireless sensor networks, Journal of Communication, 201,32 (10): 52-58.

(4) Huang Jun, Huang Bin. A secure routing protocol for wireless sensor networks based on public key matrix. Journal of Information Technology and Convergence, 2012,7 (3):127-136.

(5) Huang Jie, Huang Bei and Huang Qiucen. An improved dynamic load balancing algorithm for distributed system in local area network. Journal of Converged Information Technology.2010,5 (10): 91-98.

(6) Huang Jie. Load balancing method and stability analysis of 3G network supervision. Journal of Applied Science.2010,28 (6): 585: 591.ei.

⑦ Huang Jie. The 6th International Conference on Wireless Communication, Network and Mobile Computing (WiCom20 10)

Huang Jie. Dynamic load balancing algorithm in local area network. 2010/2 IEEE international communication technology conference (ICCT 20 10), pp: 137- 140.

(9) Huang Jun, Xie Qing, Huang Bingliang. Establishment of small-world model of homogeneous wireless sensor networks.2012 The 8th International Conference on Wireless Communication, Network and Mobile Computing.

(10) Lu, Huang. Skin color detection method based on cascade AdaBoost classifier. Journal of Shanghai Jiaotong University (English version), 20 12, 17 (2): 197-202.

(1 1) Deng Xiayang, Huang Jie. Research on the optimal data acquisition scheme of LEACH algorithm, Journal of Southeast University (Natural Science Edition), 20 12, No.65438 +0: 20-24.

(12) Oh, Huang Jun, A key management scheme for heterogeneous sensor networks based on key chain, 20 10 IEEE International Conference on Information Theory and Information Security, 20 10.

(13) Thank you. A fast small-world feature construction scheme for dynamic WSNs in endpoint search area. Journal of Southeast University (Natural Science Edition) 20 12 No.4: 593-598.

(14) Ni, Huang Jie. Porn image filtering method based on key parts of human body. Lectures on Electrical Engineering, Volume 2 12, Pages 677-688, 20 13.

(15) Zhang Sha, Huang Jie. UMTSSecurity: an enhanced radio resource control protocol. The 5th International Conference on Multimedia Information Network and Security (MINES 20 13).

(16) Wang enfei, Multi-attribute trust management scheme for wireless sensor networks. The 5th International Conference on Multimedia Information Network and Security (MINES 20 13).