Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient quantum secret sharing., and . Quantum Inf. Process., 15 (5): 2091-2100 (2016)Network covert timing channel with distribution matching., , and . Telecommun. Syst., 49 (2): 199-205 (2012)Detecting Stealthy Domain Generation Algorithms Using Heterogeneous Deep Neural Network Framework., , , , and . IEEE Access, (2020)A Modified PSO Algorithm for Parameters Identification of the Double-Dispersion Cole Model., , , , , and . J. Circuits Syst. Comput., 27 (13): 1850210:1-1850210:16 (2018)Network Packet Length Covert Channel Based on Empirical Distribution Function., , and . J. Networks, 9 (6): 1440-1446 (2014)Using Insider Swapping of Time Intervals to Perform Highly Invisible Network Flow Watermarking., , , , , and . Secur. Commun. Networks, (2018)Detecting JitterBug covert timing channel with sparse embedding., , , and . Secur. Commun. Networks, 9 (11): 1509-1519 (2016)An evaluation method of operational effectiveness for the emergency plans., , , and . SOLI, page 169-172. IEEE, (2009)Designing Rich-Secure Network Covert Timing Channels Based on Nested Lattices., , , , and . KSII Trans. Internet Inf. Syst., 13 (4): 1866-1883 (2019)Semi-Fragile Watermarking Authentication with Local and Global Watermarks., , , , and . AIAI, volume 204 of IFIP, page 681-688. Springer, (2006)