Author of the publication

Platform Utilizing Others' Behavior Data to Detect Anomalous Operation Hiding Private Information.

, , and . ICCE-TW, page 1-2. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Traffic prediction for dynamic traffic engineering considering traffic variation., , , , , and . GLOBECOM, page 1570-1576. IEEE, (2013)Predictive Traffic Engineering Incorporatingreal-World Information Inspired by the Cognitiveprocess of the Human Brain., , and . ICTC, page 543-548. IEEE, (2019)Network power saving based on Pareto optimal control with evolutionary approach., , and . ICNC, page 587-593. IEEE Computer Society, (2017)Estimating current traffic matrices accurately by using long-term variations information., , , , , and . BROADNETS, page 404-411. IEEE, (2008)Virtual Network Reconfiguration for Reducing Energy Consumption in Optical Data Centers., , and . JOCN, 6 (10): 925-942 (2014)Dynamic resource allocation mechanism for managed self-organization., , , , , and . APNOMS, page 1-4. IEEE, (2011)Deployable overlay network for defense against distributed SYN flood attacks., , and . ICCCN, page 407-412. IEEE, (2005)Data structure enabling retrieval of time series of traffic with the requested granularity., , and . ICCS, page 549-553. IEEE, (2014)Detecting Malware-infected Hosts Using Templates of Multiple HTTP Requests., , , , , and . CCNC, page 1-2. IEEE, (2020)Hierarchical Dynamic Traffic Engineering Considering the Upper Bounds of Link Utilizations., , , , and . GLOBECOM, page 1-6. IEEE, (2011)