Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Method for Scheduling Massive Vulnerability Scanning Plug-ins., and . JSW, 8 (11): 2761-2769 (2013)A novel path-based approach for single-packet IP traceback., , , and . Security and Communication Networks, 7 (2): 309-321 (2014)A Precise and Practical IP Traceback Technique Based on Packet Marking and Logging., , , and . J. Inf. Sci. Eng., 28 (3): 453-470 (2012)A Wireless Resources Allocation Method for D2MD Communication under IMT-A System., , , and . DASC, page 540-544. IEEE Computer Society, (2013)Malicious code forensics based on data mining., , and . FSKD, page 978-983. IEEE, (2013)Similarity analysis based on sparse representation for protein sequence comparison., , , , , , , , and . CYBCONF, page 382-387. IEEE, (2015)Sampling-based algorithm for link prediction in temporal networks., , , , , and . Inf. Sci., (2016)Detecting Anomalous Trajectories and Behavior Patterns Using Hierarchical Clustering from Taxi GPS Data., , , and . ISPRS Int. J. Geo-Information, 7 (1): 25 (2018)Collaborative tensor-topic factorization model for personalized activity recommendation., , , , and . Multimedia Tools Appl., 78 (12): 16923-16943 (2019)Hyperspectral Image Classification Based on Spectral-Spatial One-Dimensional Manifold Embedding., , , , , , and . IEEE Trans. Geoscience and Remote Sensing, 54 (9): 5319-5340 (2016)