Author of the publication

A quantitative assessment method of network information security vulnerability detection risk based on the meta feature system of network security data.

, , , , and . KSII Trans. Internet Inf. Syst., 15 (12): 4531-4544 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Modified Support Vector Machine model for Credit Scoring., , and . Int. J. Comput. Intell. Syst., 3 (6): 797-804 (2010)An Efficiency-Boosting Client Selection Scheme for Federated Learning With Fairness Guarantee., , , , , and . IEEE Trans. Parallel Distributed Syst., 32 (7): 1552-1564 (2021)Developing an Unsupervised Real-Time Anomaly Detection Scheme for Time Series With Multi-Seasonality., , , , , , and . IEEE Trans. Knowl. Data Eng., 34 (9): 4147-4160 (2022)VoxGenesis: Unsupervised Discovery of Latent Speaker Manifold for Speech Synthesis., , , , and . CoRR, (2024)Fusion of Global and Local Knowledge for Personalized Federated Learning., , , , and . CoRR, (2023)Accelerating Federated Learning over Reliability-Agnostic Clients in Mobile Edge Computing Systems., , , and . CoRR, (2020)PDMA: Probabilistic Service Migration Approach for Delay-aware and Mobility-aware Mobile Edge Computing., , , , , and . CoRR, (2021)Stable Task Assignment for Mobile Crowdsensing With Budget Constraint., , , , , and . IEEE Trans. Mob. Comput., 20 (12): 3439-3452 (2021)A general framework for big data knowledge discovery and integration., , , , , , and . Concurr. Comput. Pract. Exp., (2018)A list scheduling algorithm for heterogeneous systems based on a critical node cost table and pessimistic cost table., , , , and . Concurr. Comput. Pract. Exp., (2017)