Showing 1 - 2 results of 2 for search 'Fuyuan CHEN', query time: 0.01s
Refine Results
-
1
A survey of V2X security protection technologies by Fuyuan CHEN, Zhenjiang DONG, Jiankuo DONG, Minjie XU
Published 2023-03-01
Article -
2
Sufficient Conditions for Graphs to Be k-Connected, Maximally Connected, and Super-Connected by Zhen-Mu Hong, Zheng-Jiang Xia, Fuyuan Chen, Lutz Volkmann
Published 2021-01-01
Article