Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

KPI Data Anomaly Detection Strategy for Intelligent Operation and Maintenance Under Cloud Environment., , , and . Intelligent Information Processing, volume 538 of IFIP Advances in Information and Communication Technology, page 311-320. Springer, (2018)A streaming-based network monitoring and threat detection system., , , , and . SERA, page 31-37. IEEE Computer Society, (2016)Intrusion-resilient identity-based signatures: Concrete scheme in the standard model and generic construction., , , , , and . Inf. Sci., (2018)A Coarse-to-Fine Human Visual Focus Estimation for ASD Toddlers in Early Screening., , , , , , , and . ICIRA (1), volume 13455 of Lecture Notes in Computer Science, page 445-454. Springer, (2022)The Research on Control and Dynamic Property of Autonomous Vehicle Adaptive Lidar System., , , and . iThings/GreenCom/CPSCom/SmartData/Cybermatics, page 462-468. IEEE, (2020)On effective data aggregation techniques in Host-based Intrusion Detection in MANET., , , , , and . CCNC, page 85-90. IEEE, (2013)A Framework to Enable Multiple Coexisting Internet of Things Applications., , , , and . ICNC, page 637-641. IEEE Computer Society, (2018)Towards Distributed Graph Representation Learning., , , , and . ChineseCSCW (1), volume 2012 of Communications in Computer and Information Science, page 547-557. Springer, (2023)Optimized verifiable delegated private set intersection on outsourced private datasets., , , , and . Comput. Secur., (2024)UMPCA Based Feature Extraction for ECG., , , and . ISNN (1), volume 7951 of Lecture Notes in Computer Science, page 383-390. Springer, (2013)