Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Industrial Intelligent Edge Computing System based on 5G., , , , , and . IWCMC, page 1494-1498. IEEE, (2021)JABBIC Lookups: A Backend Telemetry-Based System for Malware Triage., , , and . SecureComm (2), volume 399 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 164-184. Springer, (2021)Marked for Disruption: Tracing the Evolution of Malware Delivery Operations Targeted for Takedown., , , and . RAID, page 340-353. ACM, (2021)Widespread macromolecular interaction perturbations in human genetic disorders., , , , , , , , , and 38 other author(s). Cell, 161 (3): 647--660 (Apr 23, 2015)IoT Security and Privacy Labels., and . APF, volume 11498 of Lecture Notes in Computer Science, page 136-147. Springer, (2019)Collaborative and Privacy-Preserving Machine Teaching via Consensus Optimization., , , , and . IJCNN, page 1-8. IEEE, (2019)The Tangled Genealogy of IoT Malware., , , , , and . ACSAC, page 1-16. ACM, (2020)Computing Offloading Based on Deep Reinforcement Learning For Virtual Reality Scene., and . BMSB, page 1-5. IEEE, (2023)Research on Multi-level Trustworthy Multimedia Data Broadcasting Network Based on Blockchain Oracles., , and . BMSB, page 1-5. IEEE, (2024)Overview and Trend of Large-scale Model Deployment Mode., , and . BMSB, page 1-6. IEEE, (2024)