Author of the publication

Detection and location algorithm against local-worm.

, , and . Sci. China Ser. F Inf. Sci., 51 (12): 1935-1946 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic Hair Segmentation in Complex Background., , and . ROBIO, page 2496-2501. IEEE, (2019)A Security Control Model Based on Petri Net for Industrial IoT., , , , , and . ICII, page 156-159. IEEE, (2019)Dynamic Attack and Defense Security Situation Assessment Model for Power Information Physical Fusion System., , , , , and . ICII, page 152-155. IEEE, (2019)Pairing-Free for Public Key Encryption With Equality Test Scheme., , , and . IEEE Access, (2021)eRAID: Conserving Energy in Conventional Disk-Based RAID System., , and . IEEE Trans. Computers, 57 (3): 359-374 (2008)Compressed sensing based visually secure multi-secret image encryption-sharing scheme., , , , , and . Multim. Tools Appl., 83 (7): 18919-18941 (2024)PHISS: Progressive and hierarchical image segmentation-sharing scheme., , , , and . Digit. Signal Process., (2022)Shifted declustering: a placement-ideal layout scheme for multi-way replication storage architecture., , and . ICS, page 134-144. ACM, (2008)A Flooding-Based DoS/DDoS Detecting Algorithm Based on Traffic Measurement and Prediction., , and . IWSEC, volume 4266 of Lecture Notes in Computer Science, page 252-267. Springer, (2006)An IOT-Oriented Privacy-Preserving Publish/Subscribe Model Over Blockchains., , , , and . IEEE Access, (2019)