Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Time-Series Decomposed Model of Network Traffic., , and . ICNC (2), volume 3611 of Lecture Notes in Computer Science, page 338-345. Springer, (2005)High Dimensional Inference in Partially Linear Models., , and . AISTATS, volume 89 of Proceedings of Machine Learning Research, page 2760-2769. PMLR, (2019)Make Your Webpage Carry Abundant Secret Information Unawarely., , , , , and . HPCC/EUC, page 541-548. IEEE, (2013)Electronic Skin Design Methods Applied to Capsule Robot., , , , , and . ROBIO, page 252-256. IEEE, (2019)Predictive Power of Nearest Neighbors Algorithm under Random Perturbation., , and . CoRR, (2020)An SDN-Enabled Proactive Defense Framework for DDoS Mitigation in IoT Networks., , and . IEEE Trans. Inf. Forensics Secur., (2021)TDS-KRFI: Reference Frame Identification for Live Web Streaming Toward HTTP Flash Video Protocol., , and . IEEE Trans. Netw. Serv. Manag., 20 (4): 4198-4215 (December 2023)Double Matching Under Complementary Preferences., , and . CoRR, (2023)Atlas construction from high angular resolution diffusion imaging data represented by Gaussian Mixture fields., , , , and . ISBI, page 549-552. IEEE, (2011)Towards Accurate DGA Detection based on Siamese Network with Insufficient Training Samples., , , , , and . ICC, page 2670-2675. IEEE, (2022)