Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modelling and Analysis Network Security - a PVCCS approach., , and . CoRR, (2015)Extended Probabilistic Latent Semantic Analysis Model For Topics In Time-Stamped Images., , , and . Intell. Autom. Soft Comput., 17 (7): 997-1007 (2011)Research on the Rules of Electronic Evidence in Chinese Criminal Proceedings., , and . Int. J. Digit. Crime Forensics, 12 (3): 111-121 (2020)SecGuard: Secure and Practical Integrity Protection Model for Operating Systems., , , , , and . APWeb, volume 6612 of Lecture Notes in Computer Science, page 370-375. Springer, (2011)A Practical Covert Channel Identification Approach in Source Code Based on Directed Information Flow Graph., , , and . SSIRI, page 98-107. IEEE Computer Society, (2011)Data Hidng in Digital Image Using Four Pixel-Value-Differencing and Multiple-Base Notational., and . IIH-MSP, page 76-80. IEEE, (2015)A Novel Game-Theoretic Model for Content-Adaptive Image Steganography., , , and . ICDCS Workshops, page 232-237. IEEE Computer Society, (2017)Verifying the Safety of Xen Security Modules., , and . SSIRI (Companion), page 30-34. IEEE Computer Society, (2011)CIVSched: Communication-aware Inter-VM Scheduling in Virtual Machine Monitor Based on the Process., , , and . CCGRID, page 597-604. IEEE Computer Society, (2013)Analysis of Telephone Call Detail Records Based on Fuzzy Decision Tree., , , and . e-Forensics, volume 56 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 301-311. Springer, (2010)