Author of the publication

Hunting abnormal configurations for permission-sensitive role mining.

, , , , and . MILCOM, page 1004-1009. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic Prototype Network Based on Sample Adaptation for Few-Shot Malware Detection., , , , and . IEEE Trans. Knowl. Data Eng., 35 (5): 4754-4766 (May 2023)Enhancing the Trajectory Privacy with Laplace Mechanism., , and . TrustCom/BigDataSE/ISPA (1), page 1218-1223. IEEE, (2015)Utility-based cooperative decision in cooperative authentication., , , and . INFOCOM, page 1006-1014. IEEE, (2014)Automatically verifying STRAC policy., , and . INFOCOM Workshops, page 141-142. IEEE, (2014)Analyzing asking/bidding price in dynamic game for cooperative authentication., , and . INFOCOM Workshops, page 165-166. IEEE, (2014)Real-Time Data Incentives for IoT Searches., , , , , and . ICC, page 1-6. IEEE, (2018)Rinegan: A Scalable Image Processing Architecture for Large Scale Surveillance Applications., , , , , and . Frontiers Neurorobotics, (2021)Toward inference attacks for k-anonymity., , , and . Personal and Ubiquitous Computing, 18 (8): 1871-1880 (2014)A General Distributed Object Locating Architecture in the Internet of Things., , , and . ICPADS, page 730-735. IEEE Computer Society, (2010)An Autoencoder-Based Hybrid Detection Model for Intrusion Detection With Small-Sample Problem., , , , , , and . IEEE Trans. Netw. Serv. Manag., 21 (2): 2402-2412 (April 2024)