Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reliability evaluation for NFV deployment of future mobile broadband networks., , , , and . IEEE Wirel. Commun., 23 (3): 90-96 (2016)RumorDecay: Rumor Dissemination Interruption for Target Recipients in Social Networks., , , and . IEEE Trans. Syst. Man Cybern. Syst., 52 (10): 6383-6395 (2022)SecRouting: Secure Routing for Network Functions Virtualization (NFV) Technology., and . IEEE Trans. Circuits Syst. II Express Briefs, 69 (3): 1727-1731 (2022)EDF: Enhanced Deep Fingerprinting attacks on Websites., and . NaNA, page 293-299. IEEE, (2023)Discovering Real-Time Reachable Area Using Trajectory Connections., , , , , , , and . DASFAA (2), volume 12113 of Lecture Notes in Computer Science, page 36-53. Springer, (2020)Centrality Based Privacy Preserving for Weighted Social Networks., , , , and . CIS, page 574-577. IEEE Computer Society, (2017)Multi-hop Based Centrality of a Path in Complex Network., , , , and . CIS, page 292-296. IEEE Computer Society, (2017)Doing in One Go: Delivery Time Inference Based on Couriers' Trajectories., , , , , , , , , and . KDD, page 2813-2821. ACM, (2020)Enhancing Path Reliability against Sybil Attack by Improved Multi-Path-Trees in SDN., and . GLOBECOM, page 1-6. IEEE, (2020)Walk2Privacy: Limiting target link privacy disclosure against the adversarial link prediction., , and . IEEE BigData, page 1381-1388. IEEE, (2019)