Author of the publication

Research on security evaluation of cloud computing based on attack graph.

, , , , and . CCIS, page 459-465. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Artificial Noise Generated in MIMO Scenario: Optimal Power Design., , , , , and . IEEE Signal Process. Lett., 20 (10): 964-967 (2013)An Efficient Self-Healing Key Distribution with Resistance to the Collusion Attack for Wireless Sensor Networks., and . ICC, page 1-5. IEEE, (2010)Tracking the Mobile Jammer Continuously in Time by Using Moving Vector., , , and . ISCID (1), page 43-48. IEEE, (2017)Wiretap Channel with Information Embedding on Actions., and . Entropy, 16 (4): 2105-2130 (2014)Localization of multiple jamming attackers in vehicular ad hoc network., , , , and . Int. J. Distributed Sens. Networks, (2017)Flow Sequence-Based Anonymity Network Traffic Identification with Residual Graph Convolutional Networks., , , , , , and . IWQoS, page 1-10. IEEE, (2022)Yet Another Traffic Classifier: A Masked Autoencoder Based Traffic Transformer with Multi-Level Flow Representation., , , , , , and . AAAI, page 5420-5427. AAAI Press, (2023)A Unified Host-based Intrusion Detection Framework using Spark in Cloud., , and . TrustCom, page 97-103. IEEE, (2020)Intelligent intrusion detection based on federated learning aided long short-term memory., , , and . Phys. Commun., (2020)A Semi-Supervised Federated Learning Scheme via Knowledge Distillation for Intrusion Detection., , , , , and . ICC, page 2688-2693. IEEE, (2022)