Author of the publication

Detecting DDoS attacks against data center with correlation analysis.

, , , and . Computer Communications, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A hierarchical kernel for image classification based on layered representation., , and . Comput. Syst. Sci. Eng., (2014)Contourlet Transform Based Seismic Signal Denoising via Multi-scale Information Distillation Network., , , , and . PRICAI (2), volume 11671 of Lecture Notes in Computer Science, page 660-672. Springer, (2019)CPSS: A study of Cyber Physical System as a Software-defined Service., , and . IIKI, volume 147 of Procedia Computer Science, page 528-532. Elsevier, (2018)Robust subspace segmentation via nonconvex low rank representation., , , and . Inf. Sci., (2016)Coflow Scheduling in the Multi-Resource Environment., , , , , and . IEEE Trans. Network and Service Management, 16 (2): 783-796 (2019)Deep learning hashing for mobile visual search., , , , and . EURASIP J. Image and Video Processing, (2017)Joint correlation exploitation and network coding in two-way relaying systems., , , and . Comput. Syst. Sci. Eng., (2017)MDFS: Deadline-Driven Flow Scheduling Scheme in Multi-Resource Environments., , , , , and . IEEE Trans. Multi-Scale Computing Systems, 1 (4): 207-219 (2015)An exchanged folded hypercube-based topology structure for interconnection networks., , , and . Concurrency and Computation: Practice and Experience, 27 (16): 4194-4210 (2015)An effective discretization method for disposing high-dimensional data., , , , , and . Inf. Sci., (2014)