Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research on a Multi-Level Combination of Software Defect Localization Method., , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 1305-1311. IEEE, (2019)Design and implementation of Data Center Network Global Congestion Price Calculating method based on Software Defined Networking., and . 3PGCIC, volume 1 of Lecture Notes on Data Engineering and Communications Technologies, page 459-466. Springer, (2016)Malware classification for the cloud via semi-supervised transfer learning., , , , , and . J. Inf. Secur. Appl., (2020)Adaptive Information Hiding Method Based on Feature Extraction for Visible Light Communication., , , , and . IEEE Commun. Mag., 61 (4): 102-106 (April 2023)Calculation of utility of network services based on state manifolds., , and . Comput. Networks, (2022)Privacy Protection Method Based On Multidimensional Feature Fusion Under 6G Networks., , , and . IEEE Trans. Netw. Sci. Eng., 10 (3): 1462-1471 (May 2023)Outsourcing Online/offline Proxy Re-encryption for Mobile Cloud Storage Sharing., , , , and . 3PGCIC, volume 24 of Lecture Notes on Data Engineering and Communications Technologies, page 478-485. Springer, (2018)Real-time Processing and Storage of Multimedia Data with Content Delivery Network in Vehicle Monitoring System., , , and . WINCOM, page 1-4. IEEE, (2018)A Detecting Method of Array Bounds Defects Based on Symbolic Execution., , , , and . NSS, volume 10394 of Lecture Notes in Computer Science, page 373-385. Springer, (2017)Power normalized cepstral robust features of deep neural networks in a cloud computing data privacy protection scheme., , , , , and . Neurocomputing, (2023)