Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CFDIL: a context-aware feature deep interaction learning for app recommendation., , , , , and . Soft Comput., 26 (10): 4755-4770 (2022)The extraction of security situation in heterogeneous log based on Str-FSFDP density peak cluster., , and . Int. J. Comput. Sci. Eng., 20 (3): 387-396 (2019)A Trustworthy Evaluation System Based on Blockchain., , , , and . DASFAA (3), volume 12114 of Lecture Notes in Computer Science, page 755-759. Springer, (2020)A Distributed Intrusion Detection System Based on Mobile Agents., , and . BMEI, page 1-5. IEEE, (2009)Detecting Evil-Twin Attack with the Crowd Sensing of Landmark in Physical Layer., , , , , , , and . ICA3PP (4), volume 11337 of Lecture Notes in Computer Science, page 234-248. Springer, (2018)A CAN Bus anomaly Detection Based on FLXGBoost Algorithm., and . HPCC/DSS/SmartCity/DependSys, page 1558-1564. IEEE, (2021)An Intelligent Home Middleware System Based on Context-Awareness., , and . ICNC (5), page 165-169. IEEE Computer Society, (2009)An android malware dynamic detection method based on service call co-occurrence matrices., , , , and . Ann. des Télécommunications, 72 (9-10): 607-615 (2017)Situation prediction of large-scale Internet of Things network security., , , and . EURASIP J. Information Security, (2019)A Rule-Based Ontology for Context-Aware Computing., , , and . BMEI, page 1-4. IEEE, (2009)