The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2017
DOI: 10.1007/s11276-017-1484-3
|View full text |Cite
|
Sign up to set email alerts
|

Optimal probabilistic encryption for distributed detection in wireless sensor networks based on immune differential evolution algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(9 citation statements)
references
References 18 publications
0
7
0
Order By: Relevance
“…DE is applied as clustering algorithm in order to ensure minimal energy consumption and network resilience and sustainability [37]. Other applications can be seen in [38][39][40].…”
Section: Differential Evolution In Wireless Communicationmentioning
confidence: 99%
“…DE is applied as clustering algorithm in order to ensure minimal energy consumption and network resilience and sustainability [37]. Other applications can be seen in [38][39][40].…”
Section: Differential Evolution In Wireless Communicationmentioning
confidence: 99%
“…The motivation behind using the DE is taken from the work of Chen et al 43 We have used DE to tune SVM parameters. The adjusted parameters are penalty ratio (C), acceptable error, and the deviation of the Gaussian kernel function.…”
Section: ) Differential Evolution Algorithmmentioning
confidence: 99%
“…Optimum flipping can be obtained using DE to minimize the fusion error and ensuring secure data transmission [184]. DE was applied to obtain optimal power schedule in wireless networks thereby, minimizing the occurrence of the denial of service (DoS) attacks [185].…”
Section: Securitymentioning
confidence: 99%