Author of the publication

Vulnerability Discovery and Security Protection Based on Web Application.

, , , , , , , , , , , , and . SPIoT (1), volume 1282 of Advances in Intelligent Systems and Computing, page 643-648. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Reinforcement Learning Based System for Minimizing Cloud Storage Service Cost., , , , and . ICPP, page 30:1-30:10. ACM, (2020)A Deep Learning Approach to Locate Buggy Files., , and . DESSERT, page 219-223. IEEE, (2020)Joint Task Assignment and Resource Allocation for D2D-Enabled Mobile-Edge Computing., , , and . IEEE Trans. Commun., 67 (6): 4193-4207 (2019)Multi-Antenna NOMA for Computation Offloading in Multiuser Mobile Edge Computing Systems., , and . IEEE Trans. Commun., 67 (3): 2450-2463 (2019)Robust ARQ Precoder Optimization for AF MIMO Relay Systems with Channel Estimation Errors., , and . IEEE Trans. Wirel. Commun., 12 (10): 5236-5247 (2013)Capacity Characterization of UAV-Enabled Multiple Access Channel with Trajectory Optimization., and . ICCC, page 630-635. IEEE, (2019)Placement Optimization for UAV-Enabled Wireless Networks with Multi-Hop Backhauls., and . J. Comm. Inform. Networks, 3 (4): 64-73 (2018)Achieving Dependability in Service-Oriented Systems.. Dependable and Historic Computing, volume 6875 of Lecture Notes in Computer Science, page 504-522. Springer, (2011)An Efficient Anonymous Registration Scheme for Mobile IPv4., , , and . CIS, volume 4456 of Lecture Notes in Computer Science, page 758-766. Springer, (2006)Image super resolution using Gaussian Process Regression with patch clustering., , , , and . ICIMCS, page 109-112. ACM, (2013)