Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Port and Address Hopping for Active Cyber-Defense., , , and . PAISI, volume 4430 of Lecture Notes in Computer Science, page 295-300. Springer, (2007)Identity Authentication Strategy of Mobile Crowd Sensing based on CFL., , , and . QRS, page 139-146. IEEE, (2022)An Exploratory Study on Chinese Parents' Concerns about Preschoolers' Use of Digital Devices and Expectations for Digital Literacy Education., and . ASIST, volume 59 of Proc. Assoc. Inf. Sci. Technol., page 706-708. Wiley, (2022)A decentralized and personalized spam filter based on social computing., , , and . IWCMC, page 887-894. IEEE, (2014)Game Analysis and Optimization for Evolutionary Dynamic Heterogeneous Redundancy., , , and . IEEE Trans. Netw. Serv. Manag., 20 (4): 4186-4197 (December 2023)Game analysis and decision making optimization of evolutionary dynamic honeypot., , , , , , and . Comput. Electr. Eng., (2024)Double Attention-based Deformable Convolutional Network for Recommendation., , , , and . ICCC, page 1051-1056. IEEE, (2020)Automatic Patching Based on Social Computing in P2P Network., , and . EIDWT, page 471-478. IEEE Computer Society, (2013)TagRec: Trust-Aware Generative Adversarial Network with Recurrent Neural Network for Recommender Systems., , , , , and . ML4CS (3), volume 12488 of Lecture Notes in Computer Science, page 20-32. Springer, (2020)Full Service Hopping for Proactive Cyber-Defense., , and . ICNSC, page 1337-1342. IEEE, (2008)