Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DDoS Defense Method in Software-Defined Space-Air-Ground Network from Dynamic Bayesian Game Perspective., , , and . Secur. Commun. Networks, (2022)网络层设备性能测试方法概述 (Test Method of Performance of Network Layer Device)., , , and . 计算机科学, 42 (Z6): 271-273 (2015)Deep Reinforcement Learning Based Load Balancing Routing for LEO Satellite Network., , , , , and . VTC Spring, page 1-6. IEEE, (2022)Getting too personal(ized): The importance of feature choice in online adaptive algorithms., , , , , and . CoRR, (2023)Intelligent Computing Collaboration for the Security of the Fog Internet of Things., , , , , and . Symmetry, 15 (5): 974 (April 2023)Adaptive Kernel-Width Selection for Kernel-Based Least-Squares Policy Iteration Algorithm., , , , and . ISNN (2), volume 6676 of Lecture Notes in Computer Science, page 611-619. Springer, (2011)Explainable AI for Natural Adversarial Images., , , , and . CoRR, (2021)On Complementary Punctured Binary Sequence Pairs., , and . ISIT, page 2008-2011. IEEE, (2006)FRChain: A Blockchain-based Flow-Rules-oriented Data Forwarding Security Scheme in SDN., , , , and . KSII Trans. Internet Inf. Syst., 15 (1): 264-284 (2021)A Multi-Sensory Guidance System for the Visually Impaired Using YOLO and ORB-SLAM., , , , , and . Inf., 13 (7): 343 (2022)