Author of the publication

A cost-efficient resemblance detection scheme for post-deduplication delta compression in backup systems.

, , , , , , and . Concurr. Comput. Pract. Exp., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Feature aggregating hashing for image copy detection., , , , , and . World Wide Web, 19 (2): 217-229 (2016)A Peer-to-Peer Game Model using Punishment Strategies., , , , and . J. Networks, 5 (11): 1357-1364 (2010)Research and Design of Remote Education System Based on CSCW., , , and . GCC (2), volume 3033 of Lecture Notes in Computer Science, page 1038-1041. Springer, (2003)LR-FEAD: leakage-tolerating and attribute-hiding functional encryption mechanism with delegation in affine subspaces., , and . J. Supercomput., 70 (3): 1405-1432 (2014)Image classification based on principal component analysis optimized generative adversarial networks., , , , , and . Multim. Tools Appl., 80 (6): 9687-9701 (2021)Improving Restore Performance for In-Line Backup System Combining Deduplication and Delta Compression., , , , , , , and . IEEE Trans. Parallel Distributed Syst., 31 (10): 2302-2314 (2020)Research on Network Intrusion Detection Based on Support Vector Machine Optimized with Pigeon-inspired Optimization Algorithm., , , , and . IDAACS-SWS, page 62-67. IEEE, (2018)A Network Intrusion Detection Method Based on Hybrid Rice Optimization Algorithm Improved Fuzzy C-Means., , , , and . IDAACS-SWS, page 47-52. IEEE, (2018)Security Situation Prediction based on Hybrid Rice Optimization Algorithm and Back Propagation Neural Network., , , , and . IDAACS-SWS, page 73-77. IEEE, (2018)A P2P Traffic Management Model Based on an ISP Game., , , and . J. Comput., 9 (6): 1478-1483 (2014)