Author of the publication

A behavior-aware SLA-based framework for guaranteeing the security conformance of cloud service.

, , , , and . Frontiers Comput. Sci., 14 (6): 146808 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Target-synchronization of the distributed wireless sensor networks under the same sleeping-awaking method., , , , and . J. Frankl. Inst., 349 (6): 2004-2018 (2012)Mean square exponential synchronization in Lagrange sense for uncertain complex dynamical networks., , , and . J. Frankl. Inst., 349 (3): 1267-1282 (2012)The Temporal Characteristic of Human Mobility: Modeling and Analysis of Social Worm Propagation., , and . IEEE Communications Letters, 19 (7): 1169-1172 (2015)SADI: A Novel Model to Study the Propagation of Social Worms in Hierarchical Networks., , , , , and . IEEE Trans. Dependable Secur. Comput., 16 (1): 142-155 (2019)An Information Source Identification Algorithm Based on Shortest Arborescence of Network., , , and . ICSCA, page 442-446. ACM, (2019)BRFL: A Blockchain-based Byzantine-Robust Federated Learning Model., , , and . CoRR, (2023)Capturing Dynamics of Information Diffusion in SNS: A Survey of Methodology and Techniques., , , , , and . ACM Comput. Surv., 55 (2): 22:1-22:51 (2023)A behavior-aware SLA-based framework for guaranteeing the security conformance of cloud service., , , , and . Frontiers Comput. Sci., 14 (6): 146808 (2020)Robust Reasoning Over Heterogeneous Textual Information for Fact Verification., , , , and . IEEE Access, (2020)Which Node Properties Identify the Propagation Source in Networks?, , , and . ICA3PP (1), volume 11944 of Lecture Notes in Computer Science, page 256-270. Springer, (2019)