Author of the publication

Research on Security Evaluation of XML Communication Protocol.

, , and . J. Softw., 8 (6): 1428-1435 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance Evaluation of Emergency Logistics based on DEA-AHP Algorithm., and . ICEIS (3), page 527-532. SciTePress, (2011)Study on the Construction and Application of 3D Visualization Platform for the Yellow River Basin., , , , , and . APWeb, volume 3841 of Lecture Notes in Computer Science, page 1053-1058. Springer, (2006)Improved covariant local feature detector., , , , , and . Pattern Recognit. Lett., (2020)Edge-Guided Recurrent Positioning Network for Salient Object Detection in Optical Remote Sensing Images., , , , , , and . IEEE Trans. Cybern., 53 (1): 539-552 (2023)Predictors of life satisfaction based on daily activities from mobile sensor data., , and . CHI, page 497-500. ACM, (2014)A Key Business Node Identification Model for Business Process Based on AE-VIKOR Method., , , and . FCS, volume 1286 of Communications in Computer and Information Science, page 643-653. Springer, (2020)An Enhanced YOLOv5 Model with Attention Module for Vehicle-Pedestrian Detection., , and . ISIE, page 1035-1040. IEEE, (2022)Automated Model Design and Benchmarking of Deep Learning Models for COVID-19 Detection with Chest CT Scans., , , , , , , , and . AAAI, page 4821-4829. AAAI Press, (2021)Leveraging Multiple Implicit Feedback for Personalized Recommendation with Neural Network., , , , , , and . AIAM (ACM), page 6:1-6:6. ACM, (2019)New Multi-Keyword Ciphertext Search Method for Sensor Network Cloud Platforms., , , , and . Sensors, 18 (9): 3047 (2018)