Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Wii: Device-Free Passive Identity Identification via WiFi Signals., , , , , and . GLOBECOM, page 1-6. IEEE, (2017)Robust WLAN-Based Indoor Fine-Grained Intrusion Detection., , , , and . GLOBECOM, page 1-6. IEEE, (2016)Identification of unknown operating system type of Internet of Things terminal device based on RIPPER., , , , , and . IJDSN, (2018)Sensitive Labels Matching Privacy Protection in Multi-Social Networks., , , , , and . ICC, page 1-7. IEEE, (2020)Malware Detection Based on Multi-level and Dynamic Multi-feature Using Ensemble Learning at Hypervisor., , , , , , and . Mob. Networks Appl., 26 (4): 1668-1685 (2021)Multi-pattern Matching Algorithm based on Variable Step Size., , and . ICCNS, page 125-128. ACM, (2018)Research on Task Scheduling Model for Multi-core Processor., , and . ICCNS, page 129-133. ACM, (2018)A Quantitative Evaluation Model for Network Security., , , , and . CIS, page 773-777. IEEE Computer Society, (2007)A Dynamic Event Region Tracking Approach Based on Node Calibration., , , and . ICAIS (1), volume 11632 of Lecture Notes in Computer Science, page 347-357. Springer, (2019)Location-Aware Targeted Influence Blocking Maximization in Social Networks., , , , , and . ICCCN, page 1-9. IEEE, (2019)