Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fusing and mining opinions for reputation generation., , and . Inf. Fusion, (2017)A Group-Based Distance Learning Method for Semisupervised Fuzzy Clustering., , , , and . IEEE Trans. Cybern., 52 (5): 3083-3096 (2022)SuperSketch: A Multi-Dimensional Reversible Data Structure for Super Host Identification., , , and . IEEE Trans. Dependable Secur. Comput., 19 (4): 2741-2754 (2022)ExtendedSketch: Fusing Network Traffic for Super Host Identification With a Memory Efficient Sketch., , , and . IEEE Trans. Dependable Secur. Comput., 19 (6): 3913-3924 (2022)Network traffic classification for data fusion: A survey., , , and . Inf. Fusion, (2021)Security Data Collection and Data Analytics in the Internet: A Survey., , and . IEEE Commun. Surv. Tutorials, 21 (1): 586-618 (2019)A reversible sketch-based method for detecting and mitigating amplification attacks., , , , and . J. Netw. Comput. Appl., (2019)ExtendedSketch+: Super host identification and network host trust evaluation with memory efficiency and high accuracy., , , and . Inf. Fusion, (April 2023)A survey on machine learning for data fusion., , , and . Inf. Fusion, (2020)SeDID: An SGX-enabled decentralized intrusion detection framework for network trust evaluation., , , , , and . Inf. Fusion, (2021)