Author of the publication

链路相关性欺骗攻击与检测机制 (Link Correlation Spoofing Attack and Detection Mechanism).

, , and . 计算机科学, 45 (12): 104-110 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cloud-Aware Generative Network: Removing Cloud From Optical Remote Sensing Images., , , , and . IEEE Geosci. Remote. Sens. Lett., 17 (4): 691-695 (2020)Error Resilient Coding Based on Reversible Data Hiding and Redundant Slice., , , , and . ICIG, page 223-227. IEEE Computer Society, (2011)Detecting Link Correlation Spoofing Attack: A Beacon-Trap Approach., , , and . ICC, page 1-6. IEEE, (2019)A Fast Privacy-Preserving Multi-keyword Search Scheme on Cloud Data., , , , and . CDC, page 104-110. IEEE Computer Society, (2012)Two-Step-Ranking Secure Multi-Keyword Search over Encrypted Cloud Data., , , , and . CDC, page 124-130. IEEE Computer Society, (2012)链路相关性欺骗攻击与检测机制 (Link Correlation Spoofing Attack and Detection Mechanism)., , and . 计算机科学, 45 (12): 104-110 (2018)Peer-to-Peer Energy Sharing: Effective Cost-Sharing Mechanisms and Social Efficiency., , , and . e-Energy, page 215-225. ACM, (2019)Second Order Perdicting-Error Sorting for Reversible Data Hiding., , , , , and . IWDW, volume 10082 of Lecture Notes in Computer Science, page 407-420. (2016)An Buffering Optimization Algorithm for Cooperative Mobile Service., , , , , and . SmartCom, volume 10135 of Lecture Notes in Computer Science, page 86-94. Springer, (2016)Top distance regularized projection and dictionary learning for person re-identification., , , , and . Inf. Sci., (2019)