Author of the publication

An attack pattern mining algorithm based on fuzzy logic and sequence pattern.

, , , , , and . CCIS, page 234-238. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Controlled remote state preparation of arbitrary two and three qubit states via the Brown state., , , , and . Quantum Inf. Process., 11 (6): 1653-1667 (2012)A Video Watermarking Algorithm of H.264/AVC for Content Authentication., , , , and . J. Networks, 7 (8): 1150-1154 (2012)Two statistical traffic features for certain APT group identification., , , , , , , and . J. Inf. Secur. Appl., (2022)Evolutionary machine learning builds smart education big data platform: Data-driven higher education., , , , , and . Appl. Soft Comput., (March 2023)Efficiently secure multiparty computation based on homomorphic encryption., , , and . CCIS, page 343-349. IEEE, (2016)An improved algorithm for community discovery in social networks based on label propagation., and . FSKD, page 1493-1497. IEEE, (2015)How Older Adults' Moments Sharing in SNS Contributes to Their Subjective Well-Being?, , , and . WHICEB (1), volume 480 of Lecture Notes in Business Information Processing, page 143-155. Springer, (2023)A CNN Based Visual Audio Steganography Model., , , , and . ICAIS (1), volume 13338 of Lecture Notes in Computer Science, page 431-442. Springer, (2022)Research on Energy Saving Mechanism of NB-IoT Based on eDRX., , and . VTC Spring, page 1-6. IEEE, (2021)Optimal full-duplex relay selection for physical layer security in cooperative wireless networks., , and . ICCC, page 1-6. IEEE, (2017)