Author of the publication

Matrix Differential Decomposition-Based Anomaly Detection and Localization in NFV Networks.

, , , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RSU-Empowered Resource Pooling for Task Scheduling in Vehicular Fog Computing., , , , and . IWCMC, page 1758-1763. IEEE, (2020)Is low-rate distributed denial of service a great threat to the Internet?, , , and . IET Inf. Secur., 15 (5): 351-363 (2021)Adaptive jammer localization in wireless networks., , , and . Comput. Networks, (2018)A cost-efficient elastic UAV relay network construction method with guaranteed QoS., , , and . Ad Hoc Networks, (2020)Intelligent Resource Allocation for Utility Optimization in RSU-Empowered Vehicular Network., , , , , and . IEEE Access, (2020)Joint UAV Trajectory Planning, DAG Task Scheduling, and Service Function Deployment Based on DRL in UAV-Empowered Edge Computing., , , , , and . IEEE Internet Things J., 10 (14): 12826-12838 (July 2023)IPFRA: An Online Protocol Reverse Analysis Mechanism., , , , and . ICCCS (4), volume 11066 of Lecture Notes in Computer Science, page 324-333. Springer, (2018)A Delay Step Based Geolocation Data Verification Method., , , , and . ICCCS (2), volume 11064 of Lecture Notes in Computer Science, page 426-438. Springer, (2018)Phase Timing Optimization for Smart Traffic Control Based on Fog Computing., , , and . IEEE Access, (2019)Equivalence Checking of Scheduling in High-Level Synthesis Using Deep State Sequences., , , and . IEEE Access, (2019)