Author of the publication

A High-Performance Adaptive Strategy of Container Checkpoint Based on Pre-replication.

, , , , and . SpaCCS, volume 11342 of Lecture Notes in Computer Science, page 240-250. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Fast Public Key Searchable Encryption Scheme Against Inside Keyword Attacks., , , and . ChineseCSCW, volume 1042 of Communications in Computer and Information Science, page 50-64. Springer, (2019)A High-Performance Adaptive Strategy of Container Checkpoint Based on Pre-replication., , , , and . SpaCCS, volume 11342 of Lecture Notes in Computer Science, page 240-250. Springer, (2018)Backdoor Attacks with Wavelet Embedding: Revealing and enhancing the insights of vulnerabilities in visual object detection models on transformers within digital twin systems., and . Adv. Eng. Informatics, (2024)A Verifiable Fully Homomorphic Encryption Scheme., , and . SpaCCS, volume 11611 of Lecture Notes in Computer Science, page 412-426. Springer, (2019)An Efficient Identity-based Forward Secure Signature Scheme from Lattices., and . IWCMC, page 626-631. IEEE, (2021)KPI Data Anomaly Detection Strategy for Intelligent Operation and Maintenance Under Cloud Environment., , , and . Intelligent Information Processing, volume 538 of IFIP Advances in Information and Communication Technology, page 311-320. Springer, (2018)TCP DDOS Attack Detection on the Host in the KVM Virtual Machine Environment., , , and . ACIS-ICIS, page 62-67. IEEE Computer Society, (2012)Design of Privacy-Preserving Cloud Storage Framework., , , and . GCC, page 128-132. IEEE Computer Society, (2010)Multi-user Fully Homomorphic Encryption Scheme Based on Policy for Cloud Computing., , and . WISA, volume 12999 of Lecture Notes in Computer Science, page 274-286. Springer, (2021)A Verifiable Encryption Scheme Supporting Fuzzy Search., , and . SpaCCS, volume 11611 of Lecture Notes in Computer Science, page 397-411. Springer, (2019)