Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimally Selecting the Timing of Zero-Day Attack via Spatial Evolutionary Game., , , , and . ICA3PP, volume 10393 of Lecture Notes in Computer Science, page 313-327. Springer, (2017)An Experimental Study on Instance Selection Schemes for Efficient Network Anomaly Detection., , , , and . RAID, volume 5758 of Lecture Notes in Computer Science, page 346-347. Springer, (2009)Linear Nondeterministic Dawg String Matching Algorithm., and . SPIRE, volume 3246 of Lecture Notes in Computer Science, page 70-71. Springer, (2004)PSMSP: A Parallelized Sampling-Based Approach for Mining Top-k Sequential Patterns in Database Graphs., , , and . DASFAA (3), volume 11448 of Lecture Notes in Computer Science, page 254-258. Springer, (2019)EDCleaner: Data Cleaning for Entity Information in Social Network., , , , , and . ICC, page 1-7. IEEE, (2019)SAVM: A practical secure external approach for automated in-VM management., , , and . Concurr. Comput. Pract. Exp., (2019)Correction to: Application of combined kernel function artificial intelligence algorithm in mobile communication network security authentication mechanism., and . J. Supercomput., 75 (9): 5965 (2019)A Multiobjective Particle Swarm Optimization-Based Partial Classification for Accident Severity Analysis., , , and . Applied Artificial Intelligence, 28 (6): 555-576 (2014)Towards Improving Service Accessibility by Adaptive Resource Distribution Strategy., , , , and . SecureComm (1), volume 152 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 535-540. Springer, (2014)A Novel Dynamic Self-adaptive Framework for Network Security Evaluation., , and . ISCTCS, volume 320 of Communications in Computer and Information Science, page 604-612. Springer, (2012)