Author of the publication

A microscopic competition model and its dynamics analysis on network attacks.

, , and . Concurrency and Computation: Practice and Experience, 22 (4): 503-517 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive Model Scheduling for Resource-efficient Data Labeling., , , , and . ACM Trans. Knowl. Discov. Data, 16 (4): 71:1-71:22 (2022)How to achieve non-repudiation of origin with privacy protection in cloud computing., , , and . J. Comput. Syst. Sci., 79 (8): 1200-1213 (2013)Speech Enhancement with Phase Correction based on Modified DNN Architecture., , and . APSIPA, page 1222-1227. IEEE, (2018)Distributed Multi-Agent Probabilistic Reasoning With Bayesian Networks.. ISMIS, volume 869 of Lecture Notes in Computer Science, page 285-294. Springer, (1994)Eliminating Errors in Worm Propagation Models., , , , and . IEEE Communications Letters, 15 (9): 1022-1024 (2011)The Relation Between Local and Global Influence of Individuals in Scale-Free Networks., , , , and . SocialSec, page 80-84. IEEE Computer Society, (2015)Flight Safety Analysis with Multi-information's Dynamic Perception and Synthesis., , , and . ICIS, page 811-814. IEEE Computer Society, (2018)Statistical Detection of Online Drifting Twitter Spam: Invited Paper., , and . AsiaCCS, page 1-10. ACM, (2016)Accelerating the Propagation of Active Worms by Employing Multiple Target Discovery Techniques., and . NPC, volume 5245 of Lecture Notes in Computer Science, page 150-161. Springer, (2008)Data Authentication with Privacy Protection., , , , and . Advances in Cyber Security, Springer, (2019)