Author of the publication

Vulnerabilities and Attacks of Inter-device Coordination in Programmable Networks.

, , , , , , and . IWQoS, page 1-10. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Agent-based Modeling for Price-responsive Demand Simulation., and . ICEIS (1), page 436-443. SciTePress, (2013)Analysis on the demands for traditional Chinese information systems and mode of benefiting people under the background of "Internet +"., , , and . ICSAI, page 1139-1143. IEEE, (2016)Numerical algorithm based on extended barycentric Lagrange interpolant for two dimensional integro-differential equations., , and . Appl. Math. Comput., (2021)Generalizable synthetic MRI with physics-informed convolutional networks., , , , , and . CoRR, (2023)Human Pose Driven Object Effects Recommendation., , , , and . CoRR, (2022)Mining Search Subtopics from Query Logs., , , , and . NTCIR, National Institute of Informatics (NII), (2011)RPR-Net: A Point Cloud-Based Rotation-Aware Large Scale Place Recognition Network., , , , , and . ECCV Workshops (1), volume 13801 of Lecture Notes in Computer Science, page 709-725. Springer, (2022)Reconstruction-Aware Prior Distillation for Semi-supervised Point Cloud Completion., , , , , and . IJCAI, page 726-735. ijcai.org, (2023)Predicting New User's Behavior in Online Dating Systems., , , , and . ADMA (2), volume 7121 of Lecture Notes in Computer Science, page 266-277. Springer, (2011)The CIST Summarization System at TAC 2011., , , and . TAC, NIST, (2011)