Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Study of Self-adaptive Strategy Based Incentive Mechanism in Structured P2P System., , , and . ICIC (3), volume 9773 of Lecture Notes in Computer Science, page 658-670. Springer, (2016)Hamiltonian Cycles in N2-Locally Connected Claw-Free Graphs.. Ars Comb., (2002)Fighting Pollution Attack in Peer-to-Peer Streaming Systems: A Dynamic Reputation Management Approach., , , , and . TSA, page 23-28. IEEE, (2016)Optimal Personalized DDoS Attacks Detection Strategy in Network Systems., , , and . DependSys, volume 1123 of Communications in Computer and Information Science, page 327-340. Springer, (2019)Energy efficient ant colony algorithms for data aggregation in wireless sensor networks., , , , , and . J. Comput. Syst. Sci., 78 (6): 1686-1702 (2012)Backbone analysis and algorithm design for the quadratic assignment problem., , , and . Sci. China Ser. F Inf. Sci., 51 (5): 476-488 (2008)A reversible information hiding scheme using left-right and up-down chinese character representation., , , and . J. Syst. Softw., 82 (8): 1362-1369 (2009)Vertex pancyclism in claw-free graphs.. Discret. Math., 188 (1-3): 151-173 (1998)A Sudoku-based Secret Image Sharing Scheme with Reversibility (Invited Paper)., , , and . J. Commun., 5 (1): 5-12 (2010)Analysis and evaluation of incentive mechanisms in P2P networks: a spatial evolutionary game theory perspective., , , , , and . Concurr. Comput. Pract. Exp., 27 (12): 3044-3064 (2015)