Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Improved AC High-Performance Pattern-Matching Algorithm for Intrusion Detection., , and . APWeb Workshophs, volume 8710 of Lecture Notes in Computer Science, page 200-213. Springer, (2014)EDCleaner: Data Cleaning for Entity Information in Social Network., , , , , and . ICC, page 1-7. IEEE, (2019)Analysis of the Difference between Climate Aridity Index and Meteorological Drought Index in the Summer Monsoon Transition Zone., , , , , and . Remote. Sens., 15 (5): 1175 (March 2023)SAVM: A practical secure external approach for automated in-VM management., , , and . Concurr. Comput. Pract. Exp., (2019)Four Novel Dual Discrete Memristor-Coupled Hyperchaotic Maps., , and . Int. J. Bifurc. Chaos, 34 (1): 2430001:1-2430001:28 (January 2024)Higher-Order Community Detection: On Information Degeneration and Its Elimination., , and . IEEE/ACM Trans. Netw., 31 (2): 891-903 (April 2023)Understanding the formation of interdisciplinary research from the perspective of keyword evolution: a case study on joint attention., , , , , , and . Scientometrics, 117 (2): 973-995 (2018)LPPS: Location privacy protection for smartphones., , , and . ICC, page 1-6. IEEE, (2016)Verifying cloud Service Level Agreement., , , and . GLOBECOM, page 777-782. IEEE, (2012)RnnTd: An Approach Based on LSTM and Tensor Decomposition for Classification of Crimes in Legal Cases., , , and . DSC, page 16-22. IEEE, (2019)