Author of the publication

Unexpected Data Dependency Creation and Chaining: A New Attack to SDN.

, , , , , and . SP, page 1512-1526. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Image analysis using modulated light sources, , , and . (2001)A biologically plausible spiking model for interaural level difference processing auditory pathway in human brain., and . IJCNN, page 5029-5036. IEEE, (2016)Average probe complexity of non-dominated coteries (brief announcement)., , and . PODC, page 340. ACM, (2000)News-Topic Oriented Hashtag Recommendation in Twitter Based on Characteristic Co-occurrence Word Detection., , and . ICWE, volume 7387 of Lecture Notes in Computer Science, page 16-30. Springer, (2012)A Deep Learning Model for Traffic Flow State Classification Based on Smart Phone Sensor Data., , , and . CoRR, (2017)Learning Spatiotemporal Features of Ride-sourcing Services with Fusion Convolutional Network., , , and . CoRR, (2019)Aromatics production from methanol and pentane: Conceptual process design, comparative energy and techno-economic analysis., , and . Comput. Chem. Eng., (2019)VDB-MR: MapReduce-based distributed data integration using virtual database., , , , , and . Future Gener. Comput. Syst., 26 (8): 1418-1425 (2010)Improved Traffic Sign Detection and Recognition Algorithm for Intelligent Vehicles., , , , and . Sensors, 19 (18): 4021 (2019)Human facial expression mining based on cloud model., , , and . GrC, page 557-560. IEEE Computer Society, (2009)