Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis on a Secret-Sharing Based Conditional Proxy Re-Encryption Scheme., and . Mob. Networks Appl., 22 (2): 209-215 (2017)Energy Modeling of IoT Mobile Terminals on WiFi Environmental Impacts., , , and . Sensors, 18 (6): 1728 (2018)Conservative Novelty Synthesizing Network for Malware Recognition in an Open-Set Scenario., , , , and . IEEE Trans. Neural Networks Learn. Syst., 34 (2): 662-676 (February 2023)Pattern matching and Monte-Carlo simulation mechanism for the game of NoGo., , and . CCIS, page 61-64. IEEE, (2012)Disclosing and Locating Concurrency Bugs of Interrupt-Driven IoT Programs., , , and . IEEE Internet Things J., 6 (5): 8945-8957 (2019)IKP-CDIO: exploration and practice on teaching framework of embedding ideological education into engineering curriculum., and . ICEEL, page 185-190. ACM, (2021)MDENet: Multi-modal Dual-embedding Networks for Malware Open-set Recognition., , , , , and . CoRR, (2023)Energy inefficiency diagnosis for Android applications: a literature review., , , , , , , and . Frontiers Comput. Sci., 17 (1): 171201 (2023)Detecting Android Malware Based on Extreme Learning Machine., , , , , and . DASC/PiCom/DataCom/CyberSciTech, page 47-53. IEEE Computer Society, (2017)Question answering model based on machine reading comprehension with knowledge enhancement and answer verification., , and . Concurr. Comput. Pract. Exp., (2022)