Author of the publication

A Learning-Based Framework for Constrained Shortest Path Problems.

, and . SMC, page 62-68. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Learning-Based Framework for Constrained Shortest Path Problems., and . SMC, page 62-68. IEEE, (2023)Application Identification Based on Overlap Relationship of Concurrent Flows and Their Durations., and . CNML, page 88-92. ACM, (2023)A Collaborative Intrusion Detection System against DDoS for SDN., and . IEICE Trans. Inf. Syst., 99-D (9): 2395-2399 (2016)A General Collaborative Framework for Modeling and Perceiving Distributed Network Behavior., , , , , and . IEEE/ACM Trans. Netw., 24 (5): 3162-3176 (2016)Corrigendum to "Recognizing the content types of network traffic based on a hybrid DNN-HMM model" J. Netw. Comput. Appl. 142 (2019) 51-62., , , , and . J. Netw. Comput. Appl., (2019)Recognizing the content types of network traffic based on a hybrid DNN-HMM model., , , , and . J. Netw. Comput. Appl., (2019)Turbo Codes for 10-66GHz WiMax Systems, and . International Journal of Infrared and Millimeter Waves, 26 (8): 1127-1139 (August 2005)Network Traffic Content Identification Based on Time-Scale Signal Modeling., , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (3): 2607-2624 (May 2023)Detecting Network-Wide Traffic Anomalies Based on Spatial HMM., , and . NPC Workshops, page 198-203. IEEE Computer Society, (2008)A Dynamic and Self-Adaptive Network Security Policy Realization Mechanism., and . NPC Workshops, page 88-95. IEEE Computer Society, (2008)