[1]Xiaoyu Du,Qicheng Guo, and et.al, Multi-UAV Cooperative Assisted RSU Data Acquisition Strategy considering Coverage Quality[J] WIRELESS COMMUNICATIONS & MOBILE COMPUTING,2022, SCI :000810932600010 [2]郭启程,杜晓玉,张延宇,周毅.基于改进鲸鱼算法的无人机三维路径规划[J].计算机科学,2021,48(12):304-311. [3]Xiaoyu Du, Yinyin Li, Sufang Zhou, Yi Zhou. A lightweight mutual authentication based on adaptive Trust Strategy in Flying Ad-hoc Networks. Peer-to-Peer Networking and Applications. SCI : 000800700600002 [4]Du, Xiaoyu, Cheng, Cheng, Han, Zhijie, Fan, Weibei, and Ding, Shuai, Hamiltonian properties of HCN and BCN networks[J], SUPER COMPUTING, 2022.5, SCI: 000833998900001 [5]杜晓玉,李辉,张磊,周毅.新工科的信息安全专业建设规划研究[J].计算机时代,2022(09):127-131.DOI:10.16644/j.cnki.cn33-1094/tp.2022.09. 029. [6]Coverage Optimization Algorithm based on Sampling for 3-D Underwater Sensor Networks International Journal of Distributed Sensor Networks, 2013, EI:20134216859988 SCI:000324699600001 [7]Yinyin Li, Xiaoyu Du, Sufang Zhou. A lightweight identity authentication scheme for UAV and road base stations. 2020 International Conference on Cyberspace Innovation of Advanced Technologies (CIAT 2020). (EI:20210209750805). [8]异构无线传感器网络覆盖优化算法,电子与信息学报,2014. 36(3):696-702.EI:20141517566577. [9]Iterative Location Algorithm Based on Adaptive Grid[C] ICCT 2013 .EI:20143618137158 [10]A new coverage algorithm for directional movement Wireless Sensor Networks [C], ICCSNT 2015, EI:20163002647976 [11]面向水环境监测的迭代定位算法[J],南京邮电大学学报(自然科学版),2013.33(4):46-51. [12]基于定向移动的水下传感器网络覆盖算法[J],计算机工程,2015.41(2):76-81. [13]大学电子类基础实验教学模式研究[J],实验室科学,2016.19(4):153-155. [14]共射极放大电路失真问题分析[J]实验科学与技术,2017.15 (4):11-13,26 [15]Localization Algorithm Based on Minimum Condition Number for Wireless Sensor Networks[J],Journal of Electronics (China), 2013.30(2):25-32 [16]A Coverage Algorithm in Circular Area Based on Polar Coordinates for WSNs[C],4th IEEE International Conference on Big Data Security on Cloud, BigDataSecurity 2018 [17]The Hamiltonian Property Analysis and Proof of BCube Topology[C], 4th IEEE International Conference on Big Data Security on Cloud, BigDataSecurity 2018, EI:20190206370322 [18]Topology analysis and routing algorithms design for PTNet network[J], Concurrency Computation,2020 [19]A Summary of Hamiltonian Based on Data Center Network[C], Proceedings - 5th IEEE International Conference on Big Data Security on Cloud, BigDataSecurity 2019, EI: 20192707125122 [20]A New Type Wireless Data Center of Comb Topology[C], 6th International Conference on Data Science, ICDS 2019,EI: 20201008275280 [21]DOA Estimation Based on Intelligent FMCW Radar with Triangle Array Antenna[C], 15th EAI International Conference, ChinaCom 2020, EI: 20210909978207 [22]Multi-UAVs cooperative task assignment and path planning scheme, 2021 International Conference on Computer Network Security and Software Engineering, EI: 20211610227093 [23]The Analysis of Hamiltonian based on HCN network topology[C], Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies, CIAT 2020, EI: 20210209750825 [24]Review of the embedding of hypercube and its variants, CIAT 2020: Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies, Online, [25]DSnow: A Durer pentagon Snow structure for data center network, CIAT 2020: Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced TechnologiesDecember 2020, Online, [26]A new type wireless data center of Comb topology, 6th International Conference on Data Science, ICDS 2019, Ningbo, China, |