Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Algorithms of Weightening Based on DNA Sticker Model., , and . ICPCSEE (2), volume 902 of Communications in Computer and Information Science, page 250-262. Springer, (2018)An Approach on Service Component Selection and Analysis of the Resulting System Reliability., , and . CIT, page 1246-1250. IEEE Computer Society, (2010)Mimic Encryption System for Network Security., , , and . IEEE Access, (2018)CFRV: A Decentralized Control-Flow Attestation Schema Using Mutual Secret Sharing., , , and . Sensors, 22 (16): 6044 (2022)GuiDiv: Mitigating Code-reuse Attack in an IoT Cluster Using Guided Control Flow Diversification., , , and . TrustCom, page 422-433. IEEE, (2023)Thread Private Variable Access Optimization Technique for Sunway High-Performance Multi-core Processors., , , , and . ICPCSEE (1), volume 1451 of Communications in Computer and Information Science, page 180-189. Springer, (2021)Multi-objective Firefly Algorithm for Test Data Generation with Surrogate Model., , , and . ICPCSEE (1), volume 1451 of Communications in Computer and Information Science, page 283-299. Springer, (2021)GraphNEI: A GNN-based network entity identification method for IP geolocation., , , , , , , , , and 5 other author(s). Comput. Networks, (November 2023)Detecting air-gapped attacks using machine learning., , , , , , and . Cogn. Syst. Res., (2019)An intrusion detection algorithm for wireless networks based on ASDL., , and . IEEE CAA J. Autom. Sinica, 5 (1): 92-107 (2018)