Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Node-centric route mutation for large-scale SDN based on 3D earth mover's distance model., , , , and . ISCIT, page 1-6. IEEE, (2017)Analytic model on data security in VANETs., , , , , , and . ISCIT, page 1-6. IEEE, (2017)Network Intrusion Detection Based on Supervised Adversarial Variational Auto-Encoder With Regularization., , , , and . IEEE Access, (2020)A Data Safety Transmission Solution in Web Application., , and . Web Intelligence/IAT Workshops, page 303-306. IEEE Computer Society, (2007)CENTIME: A Direct Comprehensive Traffic Features Extraction for Encrypted Traffic Classification., , , , and . ICCCS, page 490-498. IEEE, (2021)Moving Target Defense Strategy Selection Method Based on Long-term Traffic Prediction., , , , and . ICDIS, page 220-227. IEEE, (2022)Moving Target Defense Against Injection Attacks., , , , and . ICA3PP (1), volume 11944 of Lecture Notes in Computer Science, page 518-532. Springer, (2019)Computing Adaptive Feature Weights with PSO to Improve Android Malware Detection., , , , , and . Secur. Commun. Networks, (2017)Detecting Spear-phishing Emails Based on Authentication., , , , and . ICCCS, page 450-456. IEEE, (2019)Text Classification with Lexicon from PreAttention Mechanism., , and . CoRR, (2020)