Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information diffusion network inferring and pathway tracking., , , and . SCIENCE CHINA Information Sciences, 58 (9): 1-15 (2015)Two algorithms for Network Security Gradient marking., , , , and . ICITST, page 142-147. IEEE, (2011)Rule-Based Security Capabilities Matching for Web Services., , , , , , and . Wireless Personal Communications, 73 (4): 1349-1367 (2013)Server-Aided Public Key Encryption With Keyword Search., , , , , , and . IEEE Trans. Information Forensics and Security, 11 (12): 2833-2842 (2016)Logistic Regression of Point Matches for Accurate Transformation Estimation., , , , , , , and . 3DV, page 409-417. IEEE Computer Society, (2018)Spreading Activation Model for Connectivity Based Clustering., , , and . ADVIS, volume 4243 of Lecture Notes in Computer Science, page 398-407. Springer, (2006)Message Format Extraction of Cryptographic Protocol Based on Dynamic Binary Analysis., , , , , and . Journal of Research and Practice in Information Technology, (2014)Experimental Study of Atmospheric Turbulence Detection Using an Orbital Angular Momentum Beam Via a Convolutional Neural Network., , , , , , , and . IEEE Access, (2019)Entropy and Autoencoder-Based Outlier Detection in Mixed-Type Network Traffic Data., , , and . ISPA/BDCloud/SocialCom/SustainCom, page 501-508. IEEE, (2021)Packet-Sequence and Byte-Distribution is Enough for Real-Time Identification of Application Traffic., , , , , , and . ISPA/BDCloud/SocialCom/SustainCom, page 1126-1134. IEEE, (2021)