Author of the publication

A Survey of Security Vulnerability Analysis, Discovery, Detection, and Mitigation on IoT Devices.

, , , , and . Future Internet, 12 (2): 27 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Methodology for Storm Surge Risk Analysis., , , , and . IGARSS (1), page 458-461. IEEE, (2008)Anomaly Detection in Microblogging via Co-Clustering., , , , , and . J. Comput. Sci. Technol., 30 (5): 1097-1108 (2015)Composite Energy Function-Based Spatial Iterative Learning Control in Motion Systems., , , and . IEEE Trans. Contr. Sys. Techn., 26 (5): 1834-1841 (2018)Dynamic Parallel and Distributed Graph Cuts., , and . CoRR, (2015)Global-optimization-based model decomposition for support-free multi-DOF 3D printing., , , , , and . SIGGRAPH ASIA Posters, page 30:1-30:2. ACM, (2018)An approximation algorithm for vehicle routing with compatibility constraints., , and . Oper. Res. Lett., 46 (6): 579-584 (2018)An End-to-End Deep Neural Architecture for Optical Character Verification and Recognition in Retail Food Packaging., , , , , , , , and . ICIP, page 2376-2380. IEEE, (2018)Modeling the Commuting Travel Activities within Historic Districts in Chinese Cities., , , , and . Comput. Intell. Neurosci., (2014)Model for evaluating the E-commerce logistics service quality with hesitant fuzzy uncertain linguistic information.. J. Intell. Fuzzy Syst., 32 (6): 4023-4029 (2017)A performance optimization algorithm for controller reconfiguration in fault tolerant distributed model predictive control., , , and . CASE, page 886-891. IEEE, (2015)