Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Feature evaluation and selection with cooperative game theory., , , , , and . Pattern Recognit., 45 (8): 2992-3002 (2012)Research on hiberarchy trusted network based on the grade division., , , , and . ISKE, page 19-25. IEEE, (2008)A Novel Planar IPPCT Tree Structure and Characteristics Analysis., , and . J. Softw., 5 (3): 344-351 (2010)A New Remediation Model Based on Trusted Network., , , , and . CIS (2), page 242-245. IEEE Computer Society, (2008)978-0-7695-3508-1.A Robust Dynamic Watermarking Scheme Based on STBDW., , , and . CSIE (7), page 602-606. IEEE Computer Society, (2009)A DoS Detection Method Based on Composition Self-Similarity., , , , and . KSII Trans. Internet Inf. Syst., 6 (5): 1463-1478 (2012)A Novel Method-Based Software Watermarking Scheme., , , and . ITNG, page 388-392. IEEE Computer Society, (2009)