Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BRFL: A Blockchain-based Byzantine-Robust Federated Learning Model., , , and . CoRR, (2023)An Information Source Identification Algorithm Based on Shortest Arborescence of Network., , , and . ICSCA, page 442-446. ACM, (2019)Capturing Dynamics of Information Diffusion in SNS: A Survey of Methodology and Techniques., , , , , and . ACM Comput. Surv., 55 (2): 22:1-22:51 (2023)H2P: A Novel Model to Study the Propagation of Modern Hybrid Worm in Hierarchical Networks., and . ICA3PP (3), volume 12454 of Lecture Notes in Computer Science, page 251-269. Springer, (2020)Which Node Properties Identify the Propagation Source in Networks?, , , and . ICA3PP (1), volume 11944 of Lecture Notes in Computer Science, page 256-270. Springer, (2019)CRCS: Learning Synergistic Cascade Correlation for Microscopic Cascade Prediction., , , and . SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta, page 1152-1159. IEEE, (2022)HF-Mid: A Hybrid Framework of Network Intrusion Detection for Multi-type and Imbalanced Data., , , , , and . TrustCom, page 1546-1553. IEEE, (2023)Topic Reconstruction: A Novel Method Based on LDA Oriented to Intrusion Detection., , , and . ICA3PP (1), volume 11944 of Lecture Notes in Computer Science, page 578-594. Springer, (2019)Finite-time state estimation for delayed Hopfield neural networks with Markovian jump., , , and . Neurocomputing, (2015)HL-DPoS: An Enhanced Anti-Long-Range Attack DPoS Algorithm., , , , , and . CoRR, (2023)