Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of cars' commuting behavior under license plate restriction policy: a case study in Hangzhou, China., , , and . ITSC, page 236-241. IEEE, (2018)Applying gated recurrent units pproaches for workload prediction., and . NOMS, page 1-6. IEEE, (2018)A large scale transactional service selection approach based on skyline and ant colony optimization algorithm., , and . NOMS, page 1-7. IEEE, (2018)Cross-site Scripting Attacks on Android Hybrid Applications., , , and . ICCSP, page 56-61. ACM, (2017)OPUVRE: Overall Performance for Urban Vehicle Routing Environments., and . IOV, volume 8662 of Lecture Notes in Computer Science, page 120-129. Springer, (2014)Simdedup: A New Deduplication Scheme Based on Simhash., and . WAIM Workshops, volume 7901 of Lecture Notes in Computer Science, page 79-88. Springer, (2013)Fast and Parallel Trust Computing Scheme Based on Big Data Analysis for Collaboration Cloud Service., , , and . IEEE Trans. Inf. Forensics Secur., 13 (8): 1917-1931 (2018)T-Broker: A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services., , , and . IEEE Trans. Inf. Forensics Secur., 10 (7): 1402-1415 (2015)A Context-Aware S-Health Service System for Drivers., , and . Sensors, 17 (3): 609 (2017)A Two-Layer Soft-Voting Ensemble Learning Model For Network Intrusion Detection., , , and . DSN Workshops, page 155-161. IEEE, (2022)