Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Malware Detection Based on Dynamic Multi-Feature Using Ensemble Learning at Hypervisor., , , , , , and . GLOBECOM, page 1-6. IEEE, (2018)Cybersecurity risk assessment method of ICS based on attack-defense tree model., , , and . J. Intell. Fuzzy Syst., 40 (6): 10475-10488 (2021)SpanMTL: a span-based multi-table labeling for aspect-oriented fine-grained opinion extraction., , , , , , , and . Soft Comput., 27 (8): 4627-4637 (2023)An information real-time synchronisation system across different media based on position encoding for mobile computing., , , , and . Int. J. Comput. Appl. Technol., 65 (1): 45-54 (2021)You Have More Abbreviations Than You Know: A Study of AbbrevSquatting Abuse., , , , , and . ICCS (1), volume 10860 of Lecture Notes in Computer Science, page 221-233. Springer, (2018)A Survey on Security of Cloud Environment: Threats, Solutions, and Innovation., , , and . DSC, page 910-916. IEEE, (2018)CloudI: Cloud Security based on Cloud Introspection., , , and . ICMLC, page 341-346. ACM, (2018)Overview of IoT Security Architecture., , , , and . DSC, page 338-345. IEEE, (2019)A Survey: Cloud Data Security Based on Blockchain Technology., , , , and . DSC, page 618-624. IEEE, (2019)A Hybrid Intrusion Detection System Based on Scalable K-Means+ Random Forest and Deep Learning., , and . IEEE Access, (2021)