Author of the publication

Splider: A split-based crawler of the BT-DHT network and its applications.

, , , , , , , and . CCNC, page 327-335. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SF-DRDoS: The store-and-flood distributed reflective denial of service attack., , , , , , , , and . Comput. Commun., (2015)IFQ-Net: Integrated Fixed-Point Quantization Networks for Embedded Vision., , , , , and . CVPR Workshops, page 607-615. Computer Vision Foundation / IEEE Computer Society, (2018)Fairness-aware Adversarial Perturbation Towards Bias Mitigation for Deployed Deep Models., , , , , , and . CVPR, page 10369-10378. IEEE, (2022)Knowledge Representing: Efficient, Sparse Representation of Prior Knowledge for Knowledge Distillation., , , , , , and . CVPR Workshops, page 638-646. Computer Vision Foundation / IEEE, (2019)Wideband Beamspace Robust Capon Beamformer., , and . SPML, page 101-105. ACM, (2022)Moving Targets Detection and Analysis on Multi-Look Polarimetric SAR Images using PWF Method., , and . IGARSS (3), page 1190-1193. IEEE, (2008)Fooling Detection Alone is Not Enough: First Adversarial Attack against Multiple Object Tracking., , , , , and . CoRR, (2019)TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime., , and . ACM Conference on Computer and Communications Security, page 331-342. ACM, (2016)Secure dynamic code generation against spraying., , , and . ACM Conference on Computer and Communications Security, page 738-740. ACM, (2010)Densely Connected Convolutional Networks With Attention LSTM for Crowd Flows Prediction., , , , , and . IEEE Access, (2019)