Author of the publication

Ad Dissemination Game in Ephemeral Networks.

, , , , and . APWeb, volume 9313 of Lecture Notes in Computer Science, page 610-622. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimally Selecting the Timing of Zero-Day Attack via Spatial Evolutionary Game., , , , and . ICA3PP, volume 10393 of Lecture Notes in Computer Science, page 313-327. Springer, (2017)A Domain Embedding Model for Botnet Detection Based on Smart Blockchain., , , and . IEEE Internet Things J., 11 (5): 8005-8018 (2024)Syntactic Enhanced Euphemisms Identification Based on Graph Convolution Networks and Dependency Parsing., , , , , and . DSC, page 172-180. IEEE, (2023)Identifying the Propagation Sources of Stealth Worms., , , , and . ICCS (3), volume 10862 of Lecture Notes in Computer Science, page 811-817. Springer, (2018)Ad Dissemination Game in Ephemeral Networks., , , , and . APWeb, volume 9313 of Lecture Notes in Computer Science, page 610-622. Springer, (2015)Construction of Situation Assessment Indicator System Based on Latitude and Longitude Lines of Information Security., , , , , and . DSC, page 100-105. IEEE, (2019)Self-Disclosure Causality Detection: Discover What Cause the Self-Disclosure., , , , , and . DSC, page 298-305. IEEE, (2023)A Novel Wide-Baseline Stereo Matching Algorithm Combining MSER and DAISY., , and . CSAE, page 103:1-103:5. ACM, (2018)Efficiency of ETA Prediction., , , and . SIAM J. Math. Data Sci., 6 (2): 227-253 (2024)Threat-Aware Data Transmission in Software-Defined Networks., , , , , , and . DSC, page 443-449. IEEE, (2023)