Author of the publication

Multifeature Named Entity Recognition in Information Security Based on Adversarial Learning.

, , and . Secur. Commun. Networks, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A fully distributed event-triggered communication strategy for second-order multi-agent systems consensus., , and . CoRR, (2020)A Survey on End-Edge-Cloud Orchestrated Network Computing Paradigms: Transparent Computing, Mobile Edge Computing, Fog Computing, and Cloudlet., , , , and . ACM Comput. Surv., 52 (6): 125:1-125:36 (2020)Cooperative Perception for Estimating and Predicting Microscopic Traffic States to Manage Connected and Automated Traffic., , and . IEEE Trans. Intell. Transp. Syst., 23 (8): 13694-13707 (2022)Delay Tolerance for Stable Stochastic Systems and Extensions., , , and . IEEE Trans. Autom. Control., 66 (6): 2604-2619 (2021)SCCADC-SR: a real image super-resolution based on self-calibration convolution and adaptive dense connection., , , and . Multim. Tools Appl., 82 (29): 45699-45716 (December 2023)A Thread Level SLO-Aware I/O Framework for Embedded Virtualization., , , , , , and . IEEE Trans. Parallel Distributed Syst., 32 (3): 500-513 (2021)Decentralized Anonymous Authentication With Fair Billing for Space-Ground Integrated Networks., , , , , and . IEEE Trans. Veh. Technol., 70 (8): 7764-7777 (2021)Comprehensive Android Malware Detection Based on Federated Learning Architecture., , , , , , , and . IEEE Trans. Inf. Forensics Secur., (2023)Survey of data management and analysis in disaster situations., , , , and . J. Syst. Softw., 83 (10): 1701-1714 (2010)Topological Feature Maps on Parallel Computers., and . Int. J. High Speed Comput., 7 (4): 531-546 (1995)