Author of the publication

An Actor Network-Based Approach to Pirates Community Discovery in Peer-to-Peer Network.

, , , , and . BSI@PAKDD/BSIC@IJCAI, volume 8178 of Lecture Notes in Computer Science, page 204-213. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tolerance granular computing towards incomplete information system., , , and . Int. J. Granul. Comput. Rough Sets Intell. Syst., 2 (1): 10-22 (2011)Bloom filter-based workflow management to enable QoS guarantee in wireless sensor networks., , , , , , and . J. Netw. Comput. Appl., (2014)Semantic Filtering for DDL-Based Service Composition., , , , and . PRICAI, volume 5351 of Lecture Notes in Computer Science, page 778-787. Springer, (2008)Robustness Assessment of Asynchronous Advantage Actor-Critic Based on Dynamic Skewness and Sparseness Computation: A Parallel Computing View., , , , , , , , and . J. Comput. Sci. Technol., 36 (5): 1002-1021 (2021)Adversarial retraining attack of asynchronous advantage actor-critic based pathfinding., , , , , , , , , and . Int. J. Intell. Syst., 36 (5): 2323-2346 (2021)Curbing collusive cyber-gossips for business brand management., , , , and . Enterp. Inf. Syst., 11 (10): 1457-1461 (2017)Fine-Grained Recommendation Mechanism to Curb Astroturfing in Crowdsourcing Systems., , , , , , and . IEEE Access, (2017)A Training-Based Identification Approach to VIN Adversarial Examples in Path Planning., , , , and . J. Circuits Syst. Comput., 30 (13): 2150229:1-2150229:21 (2021)A Hierarchical Energy-Efficient Service Selection Approach With QoS Constraints for Internet of Things., , , , , , and . IEEE Trans. Green Commun. Netw., 5 (2): 645-657 (2021)Interaction relationships of caches in agent-based HD video surveillance: Discovery and utilization., , , , , , and . J. Netw. Comput. Appl., (2014)