Author of the publication

Cross-Border Data Security from the Perspective of Risk Assessment.

, , , , , , and . ISPEC, volume 14341 of Lecture Notes in Computer Science, page 91-104. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Joint convolutional neural pyramid for depth map super-resolution., , , , and . CoRR, (2018)Object Recognition Based on Superposition Proportion in Binary Images., , and . ECC, volume 535 of Advances in Intelligent Systems and Computing, page 69-76. (2016)New Evidence of Impacts of Cell Phone Use on Driving Performance: A Review., and . Int. J. Cyber Behav. Psychol. Learn., 3 (3): 46-61 (2013)PerContRep: a practical reputation system for pervasive content services., , and . J. Supercomput., 70 (3): 1051-1074 (2014)IEEE Access Special Section: Security Analytics and Intelligence for Cyber Physical Systems., , , , and . IEEE Access, (2020)Influence Spread in Geo-Social Networks: A Multiobjective Optimization Perspective., , , , , and . IEEE Trans. Cybern., 51 (5): 2663-2675 (2021)Security Threats and Countermeasures of Unmanned Aerial Vehicle Communications., , , and . IEEE Commun. Stand. Mag., 5 (4): 41-47 (2021)LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey., , and . IEEE Access, (2018)Nonvolatile Flexible Memory Based on a Planar Zigzag-Type Nitrogen-Doped Picene., , , , , , , , , and . Adv. Intell. Syst., 2 (12): 2000155 (2020)Right-and-left visual field stimulation: A frequency and space mixed coding method for SSVEP based brain-computer interface., , and . Sci. China Inf. Sci., 54 (12): 2492-2498 (2011)