Author of the publication

Interactive Teaching Methods in Information Security Course.

, , and . ScalCom-EmbeddedCom, page 489-493. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Reliability of ReRAM-Based DNN Implementation through Novel Weight Distribution., , and . SiPS, page 189-194. IEEE, (2019)A Reputation Management Framework Based on Global Trust Model for P2P Systems., , , and . International Conference on Computational Science (1), volume 3991 of Lecture Notes in Computer Science, page 896-899. Springer, (2006)An Adaptive Edge Marking Based Hierarchical IP Traceback System., , and . ICCNMC, volume 3619 of Lecture Notes in Computer Science, page 1188-1197. Springer, (2005)A Similarity-Based Recommendation Filtering Algorithm for Establishing Reputation-Based Trust in Peer-to-Peer Electronic Communities., , , , and . CIS (2), volume 3802 of Lecture Notes in Computer Science, page 1017-1024. Springer, (2005)Examining Privacy Concern in Social-Driven Location Sharing: An Empirical Study on Chinese Popular SNSs., , , , and . COMPSAC, page 668-677. IEEE Computer Society, (2013)MocoSFL: enabling cross-client collaborative self-supervised learning., , , , and . ICLR, OpenReview.net, (2023)MAX2: An ReRAM-Based Neural Network Accelerator That Maximizes Data Reuse and Area Utilization., , , , , and . IEEE J. Emerg. Sel. Topics Circuits Syst., 9 (2): 398-410 (2019)Security and Communication Networks Behaviors of High-Frequency Subscribers in Cellular Data Networks., , , and . Secur. Commun. Networks, (2018)EMGAN: Early-Mix-GAN on Extracting Server-Side Model in Split Federated Learning., , , , , and . AAAI, page 13545-13553. AAAI Press, (2024)NeurObfuscator: A Full-stack Obfuscation Tool to Mitigate Neural Architecture Stealing., , , , and . HOST, page 248-258. IEEE, (2021)