Author of the publication

A peer to peer traffic identification method based on support vector machine and artificial bee colony algorithm.

, , , and . IDAACS, page 982-986. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Peer-to-Peer Game Model using Punishment Strategies., , , , and . JNW, 5 (11): 1357-1364 (2010)LR-FEAD: leakage-tolerating and attribute-hiding functional encryption mechanism with delegation in affine subspaces., , and . The Journal of Supercomputing, 70 (3): 1405-1432 (2014)A P2P Traffic Management Model Based on an ISP Game., , , and . JCP, 9 (6): 1478-1483 (2014)Feature aggregating hashing for image copy detection., , , , , and . World Wide Web, 19 (2): 217-229 (2016)Research and Design of Remote Education System Based on CSCW., , , and . GCC (2), volume 3033 of Lecture Notes in Computer Science, page 1038-1041. Springer, (2003)A Method to Optimize the PTN Ring Formation Rate by Calculating the Accounting Income of Network Elements., , , , and . IDAACS, page 28-32. IEEE, (2021)LEACH-G: an Optimal Cluster-heads Selection Algorithm based on LEACH., , , and . JSW, 8 (10): 2660-2667 (2013)Automated Trust Negotiation Model based on Dynamic Game of Incomplete Information., , , , and . JSW, 8 (10): 2668-2674 (2013)Two Constructions of Multireceiver Encryption Supporting Constant Keys, Short Ciphertexts, and Identity Privacy., , , and . I. J. Network Security, 14 (5): 270-279 (2012)Public Key Replacement and Universal Forgery of a SCLS Scheme., , , and . I. J. Network Security, 15 (2): 133-138 (2013)