Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network Flow Analytics: Multi-Class Classification of DDoS Attacks Based on OKNN., , , , and . NaNA, page 271-276. IEEE, (2020)A study on exercise recommendation method using Knowledge Graph for computer network course., , , , , , and . NaNA, page 436-442. IEEE, (2020)A Pseudonym Exchange-Based Traceable Location Privacy Protection Scheme for IoV., , , , and . NaNA, page 287-292. IEEE, (2023)Petri net modeling and vulnerability analysis of the Heartbleed., , , , and . NaNA, page 155-160. IEEE, (2021)Effective Secrecy Throughput Analysis for Communication Systems with a DF Satellite Relay., , , , and . NaNA, page 1-5. IEEE, (2022)Petri Net Model of MITM Attack Based on NDP Protocol., , , and . NaNA, page 402-405. IEEE, (2022)Content Based Spam Text Classification: An Empirical Comparison between English and Chinese., , and . INCoS, page 69-76. IEEE, (2013)Local polynomial contrast binary patterns for face recognition., , , , , and . Neurocomputing, (2019)Let Them Play: The Impact of Mechanics and Dynamics of a Serious Game on Student Perceptions of Learning Engagement., , , and . IEEE Trans. Learn. Technol., 10 (4): 514-525 (2017)Big Data Analytics for New Product Success (Product Innovation)., , and . AMCIS, Association for Information Systems, (2018)