Author of the publication

Detection of Superpoints Using a Vector Bloom Filter.

, , , and . IEEE Trans. Inf. Forensics Secur., 11 (3): 514-527 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Invulnerability Measure of a Military Heterogeneous Network Based on Network Structure Entropy., , and . IEEE Access, (2018)An equilibrium multi-hop cluster hierarchy for wireless sensor networks., , , and . IWCMC, page 703-706. ACM, (2009)Optimal Methods for Object Placement in En-Route Web Caching for Tree Networks and Autonomous Systems., and . GCC (2), volume 3033 of Lecture Notes in Computer Science, page 263-270. Springer, (2003)A Stochastic Model for Analyzing Tail Latency of Multi-Tier Online Cloud Services., , , , , and . PAAP, page 16-23. IEEE, (2018)Collaborative hierarchical caching for traffic offloading in heterogeneous networks., , , and . ICC, page 1-6. IEEE, (2017)Dynamically Selecting Distribution Strategies for Web Documents According to Access Pattern., and . PDCAT, volume 3320 of Lecture Notes in Computer Science, page 554-557. Springer, (2004)A Framework of Mobile Visual Search Based on the Weighted Matching of Dominant Descriptor., , , , , and . ACM Multimedia, page 1181-1184. ACM, (2014)Glad: Global And Local Anomaly Detection., , and . ICME, page 1-6. IEEE, (2020)Accurate and Automatic Detection of Oblique RFID-Enabled Objects in Mobile Manner., , and . ISPA/BDCloud/SocialCom/SustainCom, page 92-99. IEEE, (2019)WARank: Weighted Asymmetric Ranking for Approximate Nearest Neighbor Search., , , , and . CIT/IUCC/DASC/PICom, page 297-304. IEEE, (2015)