Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Event Grouping Approach for Infinite Stream with Differential Privacy., , , and . APSCC, volume 10065 of Lecture Notes in Computer Science, page 106-116. (2016)MPICC: Multi-Path INT-Based Congestion Control in Datacenter Networks., , , and . NPC, volume 13152 of Lecture Notes in Computer Science, page 256-268. Springer, (2021)OpenSAN: a software-defined satellite network architecture., , , , , and . SIGCOMM, page 347-348. ACM, (2014)A Novel Resource-Efficient Privacy Amplification Scheme: Towards Ground-Satellite Quantum Key Distribution Post-processing., , , and . WASA, volume 8491 of Lecture Notes in Computer Science, page 336-346. Springer, (2014)NC-STP: A High Performance Network Coding Based Space Transport Protocol., , , , and . WASA, volume 8491 of Lecture Notes in Computer Science, page 34-43. Springer, (2014)ERID: A Deep Learning-based Approach Towards Efficient Real-Time Intrusion Detection for IoT., , and . COMNET, page 1-7. IEEE, (2020)Predictable Track-based Routing in Flying Ad hoc Networks., , and . CSCloud/EdgeCom, page 114-119. IEEE, (2023)A Security Real-time Privacy Amplification Scheme in QKD System., , , and . J. Univers. Comput. Sci., 19 (16): 2420-2436 (2013)ENDMal: An anti-obfuscation and collaborative malware detection system using syscall sequences., , , , and . Math. Comput. Model., 58 (5-6): 1140-1154 (2013)A privacy preserving authentication scheme with flexible identity revocation in people-centric sensing., , , , and . Math. Comput. Model., 58 (5-6): 1175-1188 (2013)