Author of the publication

A Security Model Design in Web Service Environment.

, , , and . CIT, page 736-740. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On hexavalent half-arc-transitive bi-dihedrants.. Discret. Math., 347 (12): 114180 (2024)On g-extra connectivity of folded hypercubes., and . Theor. Comput. Sci., (2015)An intelligent crowd-worker selection approach for reliable content labeling of food images., , , , , and . Wireless Health, page 9:1-9:8. ACM, (2015)BodyBeat: a mobile system for sensing non-speech body sounds., , , , , , and . MobiSys, page 2-13. ACM, (2014)Statistical attack detection., , and . RecSys, page 149-156. ACM, (2009)Enhancing diversity in Top-N recommendation.. RecSys, page 397-400. ACM, (2009)Attention-Guided Multi-Scale Segmentation Neural Network for Interactive Extraction of Region Objects from High-Resolution Satellite Imagery., , , , and . Remote. Sens., 12 (5): 789 (2020)Seismic Noise Attenuation Using Unsupervised Sparse Feature Learning., , , and . IEEE Trans. Geosci. Remote. Sens., 57 (12): 9709-9723 (2019)Deduplication and Exploitability Determination of UAF Vulnerability Samples by Fast Clustering., , and . KSII Trans. Internet Inf. Syst., 10 (10): 4933-4956 (2016)FedAIoT: A Federated Learning Benchmark for Artificial Intelligence of Things., , , , , , , , , and 1 other author(s). CoRR, (2023)