Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EI-MTD: Moving Target Defense for Edge Intelligence against Adversarial Attacks., , , , , , , and . ACM Trans. Priv. Secur., 25 (3): 23:1-23:24 (2022)Evolving defense mechanism for future network security., , , , , , and . IEEE Commun. Mag., 53 (4): 45-51 (2015)GAAT: Group Adaptive Adversarial Training to Improve the Trade-Off Between Robustness and Accuracy., , , , , , and . Int. J. Pattern Recognit. Artif. Intell., 36 (13): 2251015:1-2251015:26 (2022)Towards desirable decision boundary by Moderate-Margin Adversarial Training., , , , , , and . Pattern Recognit. Lett., (September 2023)An Approach for Crowd Density and Crowd Size Estimation., , , , and . J. Softw., 9 (3): 757-762 (2014)Eliminating Control Plane Overload via Measurement Task Placement., , , , , , and . IEEE/ACM Trans. Netw., 31 (4): 1717-1731 (August 2023)Multi-variant network address hopping to defend stealthy crossfire attack., , , , and . Sci. China Inf. Sci., (2020)A secure routing model based on distance vector routing algorithm., , , , , and . Sci. China Inf. Sci., 57 (1): 1-13 (2014)Efficient middlebox scaling for virtualized intrusion prevention systems in software-defined networks., , , , , and . Sci. China Inf. Sci., 65 (8): 1-3 (2022)Wireless big data in cellular networks: the cornerstone of smart cities., , , , and . IET Commun., 12 (13): 1517-1523 (2018)