Author of the publication

A Practical Data Forwarding Path Selecting Method for Software-Defined 5G Networking.

, , , , , and . WCNC, page 1-6. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic hypergraph neural networks based on key hyperedges., , , , , , , , and . Inf. Sci., (2022)A Cost-Effective OCR Implementation to Prevent Phishing on Mobile Platforms., , , and . Cyber Security, page 1-8. IEEE, (2020)A Multi-view Graph Learning Approach for Host-Based Malicious Behavior Detection., , , and . DASFAA (Workshops), volume 13922 of Lecture Notes in Computer Science, page 283-299. Springer, (2023)Computable Access Control: Embedding Access Control Rules Into Euclidean Space., , , , and . IEEE Trans. Syst. Man Cybern. Syst., 53 (10): 6530-6541 (October 2023)Analyzing Learning-based Encrypted Malware Traffic Classification with AutoML., , , , , and . ICCT, page 313-322. IEEE, (2021)A defense strategy for false data injection attacks in multi-agent systems., , and . Int. J. Syst. Sci., 54 (16): 3071-3084 (December 2023)Project-oriented Development and Practice of the Machinery Manufacturing Technology Course., and . Int. J. Emerg. Technol. Learn., 13 (5): 130-140 (2018)An Empirical Study: Automated Subdomain Takeover Threat Detection., , , , and . CyberSA, page 1-10. IEEE, (2021)CSCD: A Cyber Security Community Detection Scheme on Online Social Networks., , , , , and . ICDF2C, volume 508 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 135-150. Springer, (2022)Optimizing peer selection in BitTorrent networks with genetic algorithms., , and . Future Gener. Comput. Syst., 26 (8): 1151-1156 (2010)