Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Combining Source-Location Privacy and Routing Efficiency in Wireless Sensor Networks., and . GLOBECOM, page 1-5. IEEE, (2011)Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking Models., , , , , , , and . CCS, page 2025-2039. ACM, (2022)A Distributed PCM Clustering Algorithm Based on Spark., , , and . ICMLC, page 70-74. ACM, (2019)Understanding the Brains and Brawn of Illicit Streaming App., , , , , , and . ICDF2C, volume 441 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 194-214. Springer, (2021)Tossing in the Dark: Practical Bit-Flipping on Gray-box Deep Neural Networks for Runtime Trojan Injection., , , , , and . USENIX Security Symposium, USENIX Association, (2024)Energy-Aware Dynamic Topology Control Algorithm for Wireless Ad Hoc Networks., , , , , and . GLOBECOM, page 208-212. IEEE, (2008)Information cascades prediction with attention neural network., , , , and . HCIS, (2020)A multi-dimensional spam filtering framework based on threat intelligence., and . ISCID (1), page 158-162. IEEE, (2019)A hybrid gene selection method based on gene scoring strategy and improved particle swarm optimization., , , , , and . BMC Bioinform., 20-S (8): 289:1-289:13 (2019)Seeing the Forest for the Trees: Understanding Security Hazards in the 3GPP Ecosystem through Intelligent Analysis on Change Requests., , , , , , , and . USENIX Security Symposium, page 17-34. USENIX Association, (2022)