Author of the publication

Worm Propagation Model for Heterogeneous Network.

, , , , and . CyberC, page 151-154. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Improving Service Accessibility by Adaptive Resource Distribution Strategy., , , , and . SecureComm (1), volume 152 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 535-540. Springer, (2014)Identifying Users across Different Sites using Usernames., , , , and . ICCS, volume 80 of Procedia Computer Science, page 376-385. Elsevier, (2016)Empirical Measurement and Analysis of I2P Routers., , , , , and . JNW, 9 (9): 2269-2278 (2014)IX-Level Adversaries on Entry- and Exit-Transmission Paths in Tor Network., , , , and . NAS, page 166-172. IEEE Computer Society, (2013)Vision-based real-time 3D mapping for UAV with laser sensor., , , and . IROS, page 4524-4529. IEEE, (2016)Detection of Malicious Domain Names Based on Hidden Markov Model., , , , , and . DSC, page 659-664. IEEE, (2018)Character-based BiLSTM-CRF Incorporating POS and Dictionaries for Chinese Opinion Target Extraction., , , , , and . ACML, volume 95 of Proceedings of Machine Learning Research, page 518-533. PMLR, (2018)Improve Word Mover's Distance with Part-of-Speech Tagging., , , and . ICPR, page 3722-3728. IEEE Computer Society, (2018)Large-scale discovery and empirical analysis for I2P eepSites., , , , and . ISCC, page 444-449. IEEE Computer Society, (2017)Darknet Public Hazard Entity Recognition Based on Deep Learning., , , , , and . ICEA, page 94-100. ACM, (2021)