Author of the publication

A Security Evaluation Method Based on Threat Classification for Web Service.

, , , and . JSW, 6 (4): 595-603 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Detecting Method of Building Deformation Based on Terrestrial Laser Point Cloud., , , , , and . CIS, page 466-469. IEEE, (2016)Design and Implementation of a Noncontact Sleep Monitoring System Using Infrared Cameras and Motion Sensor., , , , , , , and . IEEE Trans. Instrumentation and Measurement, 67 (7): 1555-1563 (2018)Comparison of Spectral Characteristics Between China HJ1-CCD and Landsat 5 TM Imagery., , , , , , , and . IEEE J Sel. Topics in Appl. Earth Observ. and Remote Sensing, 6 (1): 139-148 (2013)Hyperspectral Image Classification with Capsule Network Using Limited Training Samples., , , , , and . Sensors, 18 (9): 3153 (2018)IRS: A Large Synthetic Indoor Robotics Stereo Dataset for Disparity and Surface Normal Estimation., , , , , and . CoRR, (2019)A Security Evaluation Method Based on Threat Classification for Web Service., , , and . JSW, 6 (4): 595-603 (2011)On sets without k-term arithmetic progression., , , and . J. Comput. Syst. Sci., 78 (2): 610-618 (2012)Research on CodeCache Management Strategy Based on Code Heat in Dynamic Binary Translator., , , and . QRS Companion, page 647-651. IEEE, (2018)Unification of MAP Estimation and Marginal Inference in Recurrent Neural Networks., , and . IEEE Trans. Neural Netw. Learning Syst., 29 (11): 5761-5766 (2018)P2P-Based Full Digital Co-simulation and Verification System Design., and . QRS Companion, page 222-227. IEEE, (2016)