Author of the publication

Invulnerability Analysis for SDN Based on Complex Network Theory.

, , , , and . HCC, volume 9567 of Lecture Notes in Computer Science, page 523-533. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A multi-objective genetic algorithm for fuzzy flexible job-shop scheduling problem., , , and . IJCAT, 45 (2/3): 115-125 (2012)Study on Automatic Detection of Airplane Object in Remote Sensing Images., , , , , , and . ICFIE, volume 62 of Advances in Intelligent and Soft Computing, page 77-85. (2009)A Novel Stochastic Block Model for Network-Based Prediction of Protein-Protein Interactions., , and . ICIC (2), volume 12464 of Lecture Notes in Computer Science, page 621-632. Springer, (2020)Supervised Quantization for Similarity Search., , , , and . CVPR, page 2018-2026. IEEE Computer Society, (2016)Analysis on Structural Vulnerability Under the Asymmetric Information., , , and . HCC, volume 10745 of Lecture Notes in Computer Science, page 503-515. Springer, (2017)between flow and bytes., , , and . BigDataService, page 179-180. IEEE, (2022)AdaptivePose: Human Parts as Adaptive Points., , , , , and . AAAI, page 2813-2821. AAAI Press, (2022)Learning Quality-Aware Representation for Multi-Person Pose Regression., , , , , and . AAAI, page 2822-2830. AAAI Press, (2022)SPCNet: Spatial Preserve and Content-Aware Network for Human Pose Estimation., , , , , and . ECAI, volume 325 of Frontiers in Artificial Intelligence and Applications, page 2776-2783. IOS Press, (2020)On performance differences of EMD and WD in the nonlinear time series analysis., , and . FSKD, page 207-211. IEEE, (2011)