Author of the publication

Build a Distributed Repository for Web Service Discovery Based on Peer-to-Peer Network.

, , , and . NPC, volume 3222 of Lecture Notes in Computer Science, page 175-182. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effect of Links on DHT Routing Algorithms., , , and . GCC (1), volume 3032 of Lecture Notes in Computer Science, page 308-315. Springer, (2003)Using the Linking Model to Understand the Performance of DHT Routing Algorithms., , , , and . ISPA, volume 3358 of Lecture Notes in Computer Science, page 544-549. Springer, (2004)On Efficient Content Matching in Distributed Pub/Sub Systems., , , , and . INFOCOM, page 756-764. IEEE, (2009)Adversarial Seeded Sequence Growing for Weakly-Supervised Temporal Action Localization., , , , , , and . CoRR, (2019)FS-IDS: A framework for intrusion detection based on few-shot learning., , , , and . Comput. Secur., (2022)Towards High Transferability on Neural Network for Black-Box Adversarial Attacks., , , and . SecureComm, volume 462 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 72-88. Springer, (2022)Multi-SDN Based Cooperation Scheme for DDoS Attack Defense., , and . SSIC, page 1-7. IEEE, (2018)eDSR: A Decentralized Service Registry for e-Commerce., , , and . ICEBE, page 615-619. IEEE Computer Society, (2005)Multi-field relation mining for malicious HTTP traffic detection based on attention and cross network., , , , and . J. Inf. Secur. Appl., (March 2023)CCID: Cross-Correlation Identity Distinction Method for Detecting Shrew DDoS., , , , , and . Wirel. Commun. Mob. Comput., (2019)