Author of the publication

Virus Propagation Modeling and Convergence Analysis in Large-Scale Networks.

, , , , and . IEEE Trans. Inf. Forensics Secur., 11 (10): 2241-2254 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Node-centric route mutation for large-scale SDN based on 3D earth mover's distance model., , , , and . ISCIT, page 1-6. IEEE, (2017)Analytic model on data security in VANETs., , , , , , and . ISCIT, page 1-6. IEEE, (2017)Network Intrusion Detection Based on Supervised Adversarial Variational Auto-Encoder With Regularization., , , , and . IEEE Access, (2020)CENTIME: A Direct Comprehensive Traffic Features Extraction for Encrypted Traffic Classification., , , , and . ICCCS, page 490-498. IEEE, (2021)A Data Safety Transmission Solution in Web Application., , and . Web Intelligence/IAT Workshops, page 303-306. IEEE Computer Society, (2007)Moving Target Defense Against Injection Attacks., , , , and . ICA3PP (1), volume 11944 of Lecture Notes in Computer Science, page 518-532. Springer, (2019)Computing Adaptive Feature Weights with PSO to Improve Android Malware Detection., , , , , and . Secur. Commun. Networks, (2017)Detecting Spear-phishing Emails Based on Authentication., , , , and . ICCCS, page 450-456. IEEE, (2019)Moving Target Defense Strategy Selection Method Based on Long-term Traffic Prediction., , , , and . ICDIS, page 220-227. IEEE, (2022)Social Bot Detection Using Tweets Similarity., , , and . SecureComm (2), volume 255 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 63-78. Springer, (2018)