Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantitative Security Assessment Method based on Entropy for Moving Target Defense., , , , , and . AsiaCCS, page 920-922. ACM, (2017)Game Theory Approaches for Evaluating the Deception-based Moving Target Defense., , , , , and . MTD@CCS, page 67-77. ACM, (2022)Automated Honeynet Deployment Strategy for Active Defense in Container-based Cloud., , , , , , and . HPCC/DSS/SmartCity, page 483-490. IEEE, (2020)Image Secret Sharing Construction for General Access Structure with Meaningful Share., , , and . Int. J. Digit. Crime Forensics, 10 (3): 66-77 (2018)WGT: Thwarting Web Attacks Through Web Gene Tree-based Moving Target Defense., , , , and . ICWS, page 364-371. IEEE, (2020)Disappeared Face: A Physical Adversarial Attack Method on Black-Box Face Detection Models., , , , , and . ICICS (1), volume 12918 of Lecture Notes in Computer Science, page 119-135. Springer, (2021)Optimal Strategy Selection for Moving Target Defense Based on Markov Game., , and . IEEE Access, (2017)A Secure Container Deployment Strategy by Genetic Algorithm to Defend against Co-Resident Attacks in Cloud Computing., , , , , and . HPCC/SmartCity/DSS, page 1825-1832. IEEE, (2019)ConfigRand: A Moving Target Defense Framework against the Shared Kernel Information Leakages for Container-based Cloud., , , , , and . HPCC/DSS/SmartCity, page 794-801. IEEE, (2020)Deepfake Detection Using Multiple Facial Features., , , , , and . IFIP Int. Conf. Digital Forensics, volume 687 of IFIP Advances in Information and Communication Technology, page 161-175. Springer, (2023)