Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Confusing-Keyword Based Secure Search over Encrypted Cloud Data., , , , and . Mob. Networks Appl., 25 (1): 125-132 (2020)Quantitative Method for Network Security Situation Based on Attack Prediction., , , and . Secur. Commun. Networks, (2017)Optimal Defense Strategies for DDoS Defender Using Bayesian Game Model., , , , and . ISPEC, volume 7863 of Lecture Notes in Computer Science, page 44-59. Springer, (2013)Enterprise LST Algorithm Development and Its Evaluation with NOAA 20 Data., , , , and . Remote. Sens., 11 (17): 2003 (2019)Ten Years of VIIRS Land Surface Temperature Product Validation., , , , and . Remote. Sens., 14 (12): 2863 (2022)Natural Language Information Hiding Based on Chinese Mathematical Expression., , , and . Int. J. Netw. Secur., 8 (1): 10-15 (2009)A parameter-free approach to lossless summarization of fully dynamic graphs., , , , and . Inf. Sci., (2022)CNN-BiLSTM-Attention: A multi-label neural classifier for short texts with a small set of labels., , , and . Inf. Process. Manag., 60 (3): 103320 (May 2023)Blockchain-Based Cloud Data Integrity Verification Scheme with High Efficiency., , , and . Secur. Commun. Networks, (2021)An Adaptive IP Hopping Approach for Moving Target Defense Using a Light-Weight CNN Detector., , , , and . Secur. Commun. Networks, (2021)