Author of the publication

NetHCF: Filtering Spoofed IP Traffic With Programmable Switches.

, , , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (2): 1641-1655 (March 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A new investment strategy based on data mining and Neural Networks., and . IJCNN, page 3094-3099. IEEE, (2014)A power allocation algorithm to maximize capacity in a full-duplex multi-carrier system., , , , and . WOCC, page 128-132. IEEE, (2015)Recreation of the Periodic Table with an Unsupervised Machine Learning Algorithm., , , , and . CoRR, (2019)A Vector Control Strategy for a Multi-Port Bidirectional DC/AC Converter With Emphasis on Power Distribution Between DC Sources., , , , , and . IECON, page 1579-1584. IEEE, (2019)Deep Learning Based Supervised Semantic Segmentation of Electron Cryo-Subtomograms., , , , , , and . ICIP, page 1578-1582. IEEE, (2018)Competition with licensed shared spectrum., and . CISS, page 1-6. IEEE, (2014)Cross-Network Prioritized Sharing: An Added Value MVNO's Perspective., , , and . INFOCOM, page 1549-1557. IEEE, (2019)Efficient and Stable Perovskite Solar Cells Prepared in Ambient Air Based on Surface-Modified Perovskite Layer, , , , , , and . The Journal of Physical Chemistry C, 121 (12): 6546--6553 (March 2017)Demonstration of Topological Data Analysis on a Quantum Processor., , , , , , , , , and . CoRR, (2018)Beyond concern - a privacy-trust-behavioral intention model of electronic commerce., , , and . Inf. Manag., 42 (2): 289-304 (2005)