Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hiding Fast Flux Botnet in Plain Email Sight., , , and . ATCS/SePrIoT@SecureComm, volume 239 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 182-197. Springer, (2017)Distributed Deep Reinforcement Learning-Based Content Caching in Edge Computing-Enabled Blockchain Networks., , , , , and . WCSP, page 1-5. IEEE, (2021)OmniLytics+: A Secure, Efficient, and Affordable Blockchain Data Market for Machine Learning through Off-Chain Processing., , and . CoRR, (2024)Length and salient losses co-supported content-based commodity retrieval neural network., , , , and . J. Electronic Imaging, (2024)A hybrid MCDM model with Monte Carlo simulation to improve decision-making stability and reliability., , , , , , , , and . Inf. Sci., (November 2023)High Velocity Kernel File Systems with Bento., , , , , , and . FAST, page 65-79. USENIX Association, (2021)Prediction Model of Lake Water Volume Based on K-Means., , , , and . ICECC, page 57-62. ACM, (2022)Password Guessing via Neural Language Modeling., , , , and . ML4CS, volume 11806 of Lecture Notes in Computer Science, page 78-93. Springer, (2019)Identifying Bitcoin Users Using Deep Neural Network., , , , , and . ICA3PP (4), volume 11337 of Lecture Notes in Computer Science, page 178-192. Springer, (2018)SilentSign: Device-free Handwritten Signature Verification through Acoustic Sensing., , , , and . PerCom, page 1-10. IEEE, (2020)