Author of the publication

Fast quarantining of proactive worms in unstructured P2P networks.

, , , , and . J. Netw. Comput. Appl., 34 (5): 1648-1659 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SegGPT: Towards Segmenting Everything In Context., , , , , and . ICCV, page 1130-1140. IEEE, (2023)A Cloud-based IoMT Data Sharing Scheme with Conditional Anonymous Source Authentication., , , , , , and . GLOBECOM, page 2915-2920. IEEE, (2022)Defending Data Poisoning Attack via Trusted Platform Module and Blockchain Oracle., , , , and . ICC, page 1245-1250. IEEE, (2022)On Meta Levels of an Organized Society of KDD Agents., , , , and . PKDD, volume 1263 of Lecture Notes in Computer Science, page 367-375. Springer, (1997)Improving Velocity of Stick-Slip Piezoelectric Actuators With Optimized Flexure Hinges Based on SIMP Method., , , , , and . IEEE Access, (2020)IPCADP-Equalizer: An Improved Multibalance Privacy Preservation Scheme against Backdoor Attacks in Federated Learning., , , , and . Int. J. Intell. Syst., (2023)Malware on Internet of UAVs Detection Combining String Matching and Fourier Transformation., , , , , , and . IEEE Internet Things J., 8 (12): 9905-9919 (2021)Blockchain-based deduplication with arbitration and incentives., , , , , and . IET Inf. Secur., 16 (6): 401-416 (2022)Information Leakage in Encrypted Deduplication via Frequency Analysis: Attacks and Defenses., , , , and . CoRR, (2019)The convergence and termination criterion of quantum-inspired evolutionary neural networks., , , , and . Neurocomputing, (2017)