Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DDoS: Flood vs. Shrew., , , and . JCP, 9 (6): 1426-1435 (2014)Research on the Aggregation and Synchronization of LDDoS Attack Based On Euclidean Distance., , and . JSW, 9 (7): 1854-1861 (2014)Flow-oriented detection of low-rate denial of service attacks., , and . Int. J. Communication Systems, 29 (1): 130-141 (2016)Hyperspectral Image Classification Based on Parameter-Optimized 3D-CNNs Combined with Transfer Learning and Virtual Samples., , , , and . Remote Sensing, 10 (9): 1425 (2018)Bayesian Belief Network Model Quantification Using Distribution-Based Node Probability and Experienced Data Updates for Software Reliability Assessment., , , , , , , and . IEEE Access, (2018)Learning 3D-aware Egocentric Spatial-Temporal Interaction via Graph Convolutional Networks., , , and . CoRR, (2019)Low-Rate DoS Attacks Detection Based on Network Multifractal., , and . IEEE Trans. Dependable Sec. Comput., 13 (5): 559-567 (2016)Classification of Hyperspectral Image by CNN Based on Shadow Area Enhancement Through Dynamic Stochastic Resonance., , , and . IEEE Access, (2019)SIGNet: Semantic Instance Aided Unsupervised 3D Geometry Perception., , , , , , , and . CVPR, page 9810-9820. Computer Vision Foundation / IEEE, (2019)Resource Allocation for Energy Harvesting-Aided Device-to-Device Communications: A Matching Game Approach., , , and . IEEE Access, (2019)