Author of the publication

A Node-labeling-based Method for Evaluating the Anonymity of Tor Network.

, , , , and . COMPSAC, page 773-778. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrated metric learning with adaptive constraints for person re-identification., , , and . ICIP, page 161-165. IEEE, (2017)Cloud Multimedia Files Assured Deletion Based on Bit Stream Transformation with Chaos Sequence., , and . ICA3PP, volume 10393 of Lecture Notes in Computer Science, page 441-451. Springer, (2017)Advertising Keywords Extraction from Web Pages., , , and . WISM, volume 6318 of Lecture Notes in Computer Science, page 336-343. Springer, (2010)Towards Multi-Controller Placement for SDN Based on Density Peaks Clustering., , , , and . ICC, page 1-6. IEEE, (2019)A Weighted PageRank-Based Algorithm for Virtual Machine Placement in Cloud Computing., , and . IEEE Access, (2019)A comparison between the PoolODMRP and the PatchODMRP., , and . ICON, page 729-735. IEEE, (2003)Expanding Training Set for Graph-Based Semi-supervised Classification., , and . DEXA (2), volume 12392 of Lecture Notes in Computer Science, page 245-258. Springer, (2020)A Two-Phase Time-based Consistent Checkpointing Strategy., , and . ITNG, page 518-523. IEEE Computer Society, (2006)A Fault-Tolerant Single-Chip Multiprocessor., , and . Asia-Pacific Computer Systems Architecture Conference, volume 3189 of Lecture Notes in Computer Science, page 137-145. Springer, (2004)A Joint Entity and Relation Extraction Approach Using Dilated Convolution and Context Fusion., , , and . NLPCC (1), volume 14302 of Lecture Notes in Computer Science, page 135-146. Springer, (2023)