Author of the publication

DoS Attack Detection Based on Deep Factorization Machine in SDN.

, , , , , and . Comput. Syst. Sci. Eng., 45 (2): 1727-1742 (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Probability Preferred Priori Offloading Mechanism in Mobile Edge Computing., , , , , , , and . IEEE Access, (2020)ReYOLO: A traffic sign detector based on network reparameterization and features adaptive weighting., , , , and . J. Ambient Intell. Smart Environ., 14 (4): 317-334 (2022)Influential Parameters for Dynamic Analysis of a Hydraulic Control Valve., , , , and . FGIT-MulGraB (2), volume 263 of Communications in Computer and Information Science, page 241-247. Springer, (2011)Energy Efficiency Maximization for UAV and Electric Vehicle Assisted Mobile Edge Computing on the Edge Side., , , , and . ICAIS (3), volume 13340 of Lecture Notes in Computer Science, page 469-481. Springer, (2022)Location Privacy Protection Research Based on Querying Anonymous Region Construction for Smart Campus., , , , and . Mob. Inf. Syst., (2018)Fixed-Width Modified Booth Multiplier Design Based on Error Bound Analysis., , , , , and . FGIT-MulGraB (2), volume 263 of Communications in Computer and Information Science, page 248-256. Springer, (2011)Interference-Aware Routing for Difficult Wireless Sensor Network Environment with SWIPT., , , , , , and . Sensors, 19 (18): 3978 (2019)Real-Time Communication using TMO(Time-Triggered and Message-Triggered Object) in Distributed Computing Systems., , , , and . J. Inform. and Commun. Convergence Engineering, 1 (1): 12-22 (2003)Modification of Feed Forward Process and Activation Function in Back-Propagation., , and . FGIT-MulGraB (2), volume 263 of Communications in Computer and Information Science, page 234-240. Springer, (2011)Integrity Verification Mechanism of Sensor Data Based on Bilinear Map Accumulator., , , , and . ACM Trans. Internet Techn., 21 (1): 5:1-5:19 (2021)