Author of the publication

An Approach for Description of Computer Network Defense Scheme and Its Simulation Verification.

, , , , and . JCP, 9 (2): 388-395 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Inter-view Coding Correlation Based Error Concealment for Stereoscopic Video Transmission., , and . ICIG, page 249-253. IEEE Computer Society, (2011)Distributionally Robust Secure Transmission for MISO Downlink Networks With Assisting Jammer., , , , and . IEEE Access, (2019)Secrecy Throughput Optimization for the WPCNs With Non-Linear EH Model., , , and . IEEE Access, (2019)Gnome: A Practical Approach to NLOS Mitigation for GPS Positioning in Smartphones., , and . MobiSys, page 163-177. ACM, (2018)Integrated Velocity Measurement Algorithm Based on Optical Flow and Scale-Invariant Feature Transform., , , , , , , and . IEEE Access, (2019)Maximal Temporal Period of a Periodic Solution Generated by a One-Dimensional Cellular Automaton., and . Complex Syst., 30 (3): 239-272 (2021)Evaluation and Measurement of Software Testing Process Quality Applicable to Software Testing Laboratory., , and . APSEC, page 8-15. IEEE Computer Society, (2015)TAR: Enabling Fine-Grained Targeted Advertising in Retail Stores., , , and . MobiSys, page 323-336. ACM, (2018)QuickSketch: Building 3D Representations in Unknown Environments Using Crowdsourcing., , , , and . FUSION, page 2314-2321. IEEE, (2018)Kestrel: Video Analytics for Augmented Multi-Camera Vehicle Tracking., , , , , , , and . IoTDI, page 48-59. IEEE Computer Society, (2018)