Author of the publication

Identification of important nodes on large-scale Internet based on unsupervised learning.

, , , , , , , and . CIAT, page 121-129. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network Security Situation Awareness Technology Based on Multi-source Heterogeneous Data., , , , , and . CIAT, page 420-424. ACM, (2020)Identification of important nodes on large-scale Internet based on unsupervised learning., , , , , , , and . CIAT, page 121-129. ACM, (2020)(Deterministic) Hierarchical Identity-based Encryption from Learning with Rounding over Small Modulus., , , , , and . AsiaCCS, page 907-912. ACM, (2016)CCA Secure Public Key Encryption Scheme Based on LWE Without Gaussian Sampling., , , and . Inscrypt, volume 9589 of Lecture Notes in Computer Science, page 361-378. Springer, (2015)Approximate-Deterministic Public Key Encryption from Hard Learning Problems., , , , and . INDOCRYPT, volume 10095 of Lecture Notes in Computer Science, page 25-42. (2016)Compact Hierarchical IBE from Lattices in the Standard Model., , , , and . ICICS, volume 10631 of Lecture Notes in Computer Science, page 210-221. Springer, (2017)Deterministic Identity-Based Encryption from Lattices with More Compact Public Parameters., , , and . IWSEC, volume 10418 of Lecture Notes in Computer Science, page 215-230. Springer, (2017)Improved Efficiency of MP12., , , and . IWSEC, volume 9241 of Lecture Notes in Computer Science, page 193-210. Springer, (2015)