Author of the publication

Review of Innovative Cyberspace Security Research Inspired by Bionics Computing Methods.

, , , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 1486-1493. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attention-Based Interaction Trajectory Prediction., , , and . AIMS, volume 12401 of Lecture Notes in Computer Science, page 168-175. Springer, (2020)Cyberspace Surveying and Mapping: Hierarchical Model and Resource Formalization., , , , , , and . INFOCOM Workshops, page 68-72. IEEE, (2019)Stop-Probability-Based Network Topology Discovery Method., , , , and . IEICE Trans. Commun., 107 (9): 583-594 (2024)Software Vulnerability Mining Based on the Human-Computer Coordination., , , , and . IHSI, volume 1131 of Advances in Intelligent Systems and Computing, page 532-538. Springer, (2020)An Analysis Model of Buffer Overflow Vulnerability Based on FSM., , and . ICGDA, page 47-51. ACM, (2019)An Opcode Sequences Analysis Method For Unknown Malware Detection., , , , , , and . ICGDA, page 15-19. ACM, (2019)Review of Innovative Cyberspace Security Research Inspired by Bionics Computing Methods., , , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 1486-1493. IEEE, (2019)ISPPFL: An incentive scheme based privacy-preserving federated learning for avatar in metaverse., , , , , , , , , and . Comput. Networks, (2024)Modeling and Control of a Miniature Servo Pneumatic Actuator., and . ICRA, page 1806-1811. IEEE, (2006)Vulnerability Discovery in Network Systems Based on Human-Machine Collective Intelligence., , , , and . IHSI, volume 1131 of Advances in Intelligent Systems and Computing, page 453-458. Springer, (2020)