Author of the publication

A whitelist and blacklist-based co-evolutionary strategy for defensing against multifarious trust attacks.

, , , , and . Appl. Intell., 47 (4): 1115-1131 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Governance Model and Rents Allocation in Asymmetrical Power Relations: The Case of Notebook Computer Industry., and . WHICEB, page 35. Association for Information Systems, (2014)Correction to: A whitelist and blacklist-based co-evolutionary strategy for defensing against multifarious trust attacks., , , , and . Appl. Intell., 48 (7): 1891 (2018)A whitelist and blacklist-based co-evolutionary strategy for defensing against multifarious trust attacks., , , , and . Appl. Intell., 47 (4): 1115-1131 (2017)The Research in Grade Teaching of Elementary Course of Computer., , , and . ICYCS, page 2485-2489. IEEE Computer Society, (2008)What Drives Mobile Game Stickiness? A Perspective from Uses and Gratifications Theory., , and . HCI (36), volume 13337 of Lecture Notes in Computer Science, page 133-149. Springer, (2022)Research on Hybrid Teaching Model of Strategic Management from the Ecological Perspective., , and . WHICEB (2), volume 516 of Lecture Notes in Business Information Processing, page 14-24. Springer, (2024)Research on MMC-based cascaded converter impedance., , , , , and . FNC/MobiSPC/SEIT, volume 203 of Procedia Computer Science, page 395-400. Elsevier, (2022)Research on the Peer Effect of Digital Innovation in Manufacturing Enterprises., , , and . WHICEB (2), volume 516 of Lecture Notes in Business Information Processing, page 374-385. Springer, (2024)