Author of the publication

A Game Theoretical Attack-Defense Model Oriented to Network Security Risk Assessment.

, , , , and . CSSE (3), page 1097-1103. IEEE Computer Society, (2008)978-0-7695-3336-0.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Wireless sensor network-enabled intravenous infusion monitoring., , , and . IET Wirel. Sens. Syst., 1 (4): 241-247 (2011)Product Design Model for E-Commerce Cantonese Porcelain Based on User Perceptual Image in China., , , and . HCI (3), volume 12183 of Lecture Notes in Computer Science, page 350-364. Springer, (2020)Question Splitting and Unbalanced Multi-modal Pooling for VQA., , , , and . ICME Workshops, page 222-227. IEEE, (2019)Fine-Grained Visual Classification Based on Image Foreground and Sub-category Similarity., , , , and . CCCV (3), volume 773 of Communications in Computer and Information Science, page 143-154. Springer, (2017)Group Based Strategy to Accelerate Rendezvous in Cognitive Radio Networks., , , , and . ICCCN, page 1-9. IEEE, (2018)Automatic facial expression recognition based on spatiotemporal descriptors., and . Pattern Recognit. Lett., 33 (10): 1373-1380 (2012)基于跳频的认知无线电网络中的时隙优化策略 (Time Slot Optimization for Channel Hopping in CRN)., , and . 计算机科学, 46 (11): 58-64 (2019)Object Detection in Dynamic Scenes Based on Codebook with Superpixels., , , and . ACPR, page 430-434. IEEE, (2013)Style Transfer for Anime Sketches with Enhanced Residual U-net and Auxiliary Classifier GAN., , and . CoRR, (2017)Cantonese porcelain classification and image synthesis by ensemble learning and generative adversarial network., , , , , , and . Frontiers Inf. Technol. Electron. Eng., 20 (12): 1632-1643 (2019)