Author of the publication

Security Event Classification Method for Fiber-optic Perimeter Security System Based on Optimized Incremental Support Vector Machine.

, , , , , and . CCPR (2), volume 484 of Communications in Computer and Information Science, page 595-603. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A survey of dynamic bandwidth allocation algorithms for Ethernet Passive Optical Networks., and . Optical Switching and Networking, 6 (3): 151-162 (2009)BARA: A Battery Energy and Data Rate Aware Resource Allocation Algorithm for QoE in D2D Communication Underlaying Cellular Networks., , and . ICC, page 1-6. IEEE, (2018)Capacity analysis of MIMO systems with unknown channel state information., and . ITW, page 413-417. IEEE, (2004)Analysis of the Effect of Channel Sub-rating in Unidirectional Call Overflow Scheme for Call Admission in Hierarchical Cellular Networks., , , and . VTC Spring, page 1265-1269. IEEE, (2007)Dynamic reconfiguration based on balanced alternate routing algorithm (BARA) for all-optical wavelength-routed WDM networks., , and . GLOBECOM, page 2706-2710. IEEE, (2002)Blocking Model for All-Optical Overlaid-Star TDM Networks., , and . GLOBECOM, IEEE, (2006)Delivery delay analysis for roadside unit deployment in intermittently connected VANETs., , and . GLOBECOM, page 155-161. IEEE, (2014)A User-Habit Property: Haunting of Users in IP Networks., , , and . IEICE Transactions, 90-D (1): 371-373 (2007)Security Event Classification Method for Fiber-optic Perimeter Security System Based on Optimized Incremental Support Vector Machine., , , , , and . CCPR (2), volume 484 of Communications in Computer and Information Science, page 595-603. Springer, (2014)Privacy Pal: Improving Permission Safety Awareness of Third Party Applications in Online Social Networks., , and . HPCC/CSS/ICESS, page 1268-1273. IEEE, (2015)