Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Systematic Policy Analysis for High-Assurance Services in SELinux., , and . POLICY, page 3-10. IEEE Computer Society, (2008)An Accelerated Two-Step Iteration Hybrid-norm Algorithm for Image Restoration., , , , , and . CCCV (2), volume 547 of Communications in Computer and Information Science, page 335-343. Springer, (2015)Conditional dual-connectivity decoupling design framework for OMA and NOMA heterogeneous networks and performance comparison., , , and . IET Communications, 13 (13): 2020-2032 (2019)DR@FT: Efficient Remote Attestation Framework for Dynamic Systems., , , , and . ESORICS, volume 6345 of Lecture Notes in Computer Science, page 182-198. Springer, (2010)Visualization based policy analysis: case study in SELinux., , and . SACMAT, page 165-174. ACM, (2008)Towards System Integrity Protection with Graph-Based Policy Analysis., , and . DBSec, volume 5645 of Lecture Notes in Computer Science, page 65-80. Springer, (2009)Hybrid Self-Backhaul and Cache Assisted Millimeter Wave Two-Tier Heterogeneous Networks With MIMO Equipped Backhaul Access Points., , , and . IEEE Access, (2019)Cross-Tier Dual-Connectivity Designs of Three-Tier Hetnets With Decoupled Uplink/Downlink and Global Coverage Performance Evaluation., , , and . IEEE Access, (2019)Effective self-backhaul scheme for massive MIMO-enabled full-duplex heterogeneous networks by exploiting NOMA., , , and . Trans. Emerging Telecommunications Technologies, (2019)Access Control Management for SCADA Systems., , and . IEICE Transactions, 91-D (10): 2449-2457 (2008)