Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing Internet Applications from Routing Attacks., , , , , , and . CoRR, (2020)Influence of Murder Incident of Ride-hailing Drivers on Ride-hailing User's Consuming Willingness in Nanchang., , , , , and . CoRR, (2020)Representation of Chinese criminal law in the semantic web., , , and . ICNC-FSKD, page 1676-1680. IEEE, (2016)Creating a Secure Underlay for the Internet., , , , , , , , and . USENIX Security Symposium, page 2601-2618. USENIX Association, (2022)Output Feedback Synthesis for a Two-Agent Nonlinear Microrobotic System., , and . CDC, page 6844-6850. IEEE, (2019)Adaptive replanning and control for magnetic microrobots tracking despite unknown blood velocity., , and . CDC, page 1789-1794. IEEE, (2021)Global Analysis with Aggregation-based Beaconing Detection across Large Campus Networks., , , , , and . ACSAC, page 565-579. ACM, (2023)Detecting Malware Injection with Program-DNS Behavior., , , , , , , , , and 1 other author(s). EuroS&P, page 552-568. IEEE, (2020)A Prototype Preceding Vehicle Identification System Development and Field Evaluation., , , , , , and . VEHITS, page 444-451. SCITEPRESS, (2024)A flexible capacitive tactile sensing array for pressure measurement., , , and . ROBIO, page 2344-2349. IEEE, (2014)