Author of the publication

A MITM Based Penetration Test Efficiency Improvement Approach for Traffic-Encrypted Mobile Applications of Power Industry.

, , , , , and . ICCCS, page 743-747. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Decision tree methods: applications for classification and prediction, and . Shanghai archives of psychiatry, (April 2015)ISCRAM-CHINA 2008 Meeting Report., and . IJISCRAM, 1 (2): 68-70 (2009)Mouth State Detection From Low-Frequency Ultrasonic Reflection., and . Circuits Syst. Signal Process., 34 (4): 1279-1304 (2015)Learning Adaptive Downsampling Encoding for Online End-to-End Speech Recognition., , , , and . APSIPA, page 850-854. IEEE, (2019)The description of iFlyTek Speech Lab system for NIST2009 Language Recognition Evaluation., , , , and . ISCSLP, page 157-161. IEEE, (2010)Speaker to Emotion: Domain Adaptation for Speech Emotion Recognition with Residual Adapters., , , , and . APSIPA, page 513-518. IEEE, (2019)Tibetan-Mandarin bilingual speech recognition based on end-to-end framework., , , and . APSIPA, page 1214-1217. IEEE, (2017)Intra-conversation intra-speaker variability compensation for speaker clustering., , , and . ISCSLP, page 330-334. IEEE, (2012)Bridging the gap between missing and inconsistent values in eliciting preference from pairwise comparison matrices., , , and . Ann. Oper. Res., 235 (1): 155-175 (2015)Reinforcement Learning with Action-Specific Focuses in Video Games., , , , , , and . CoG, page 9-16. IEEE, (2020)