Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Routing optimization with path cardinality constraints in a hybrid SDN., , , , and . Comput. Commun., (2021)An Effective Deep Neural Network for Lung Lesions Segmentation From COVID-19 CT Images., , , , , , , and . IEEE Trans. Ind. Informatics, 17 (9): 6528-6538 (2021)Dark-Point Component Analysis: Nonnegative Blind Source Separation Based on Jaccard Index., , , , and . Circuits Syst. Signal Process., 41 (7): 3985-4003 (2022)A hybrid link protection scheme for ensuring network service availability in link-state routing networks., , , , , , , and . J. Commun. Networks, 22 (1): 46-60 (2020)threaTrace: Detecting and Tracing Host-based Threats in Node Level Through Provenance Graph Learning., , , , , , , , and . CoRR, (2021)Practical Traffic-space Adversarial Attacks on Learning-based NIDSs., , , , , , , and . CoRR, (2020)Traffic Engineering in Hybrid Software Defined Network via Reinforcement Learning., , , , , , , and . J. Netw. Comput. Appl., (2021)C3DBed: Facial micro-expression recognition with three-dimensional convolutional neural network embedding in transformer model., , and . Eng. Appl. Artif. Intell., 123 (Part A): 106258 (2023)Complex Embedding with Type Constraints for Link Prediction., , and . Entropy, 24 (3): 330 (2022)THREATRACE: Detecting and Tracing Host-Based Threats in Node Level Through Provenance Graph Learning., , , , , , , , and . IEEE Trans. Inf. Forensics Secur., (2022)