Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An improved EAAP scheme for vehicular ad hoc networks., , , , , and . Int. J. Commun. Syst., (2020)Automatic classification of wooden cabinet doors., and . WACV, page 18-25. IEEE, (1994)Self-Normalizing Generative Adversarial Network for Super-Resolution Reconstruction of SAR Images., , , , , and . IGARSS, page 1911-1914. IEEE, (2019)Improving Chinese Internet's Resilience through Degree Rank Based Overlay Relays Placement., , , , and . ICC, page 5823-5827. IEEE, (2008)Research on Intelligent Algorithm of Identity Authentication Based on Facial Features., , , and . Wirel. Commun. Mob. Comput., (2021)Clustering Based on Supervised Learning of Exemplar Discriminative Information., , , and . IEEE Trans. Syst. Man Cybern. Syst., 50 (12): 5255-5270 (2020)Exploring New Opportunities to Defeat Low-Rate DDoS Attack in Container-Based Cloud Environment., , , and . IEEE Trans. Parallel Distributed Syst., 31 (3): 695-706 (2020)Minimizing Financial Cost of DDoS Attack Defense in Clouds With Fine-Grained Resource Management., , , , , , , and . IEEE Trans. Netw. Sci. Eng., 7 (4): 2541-2554 (2020)IoT Anomaly Detection Via Device Interaction Graph., , , , and . DSN, page 494-507. IEEE, (2023)Fine-Grained Code Clone Detection with Block-Based Splitting of Abstract Syntax Tree., , , , , , and . ISSTA, page 89-100. ACM, (2023)