Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EI-MTD: Moving Target Defense for Edge Intelligence against Adversarial Attacks., , , , , , , and . ACM Trans. Priv. Secur., 25 (3): 23:1-23:24 (2022)Evolving defense mechanism for future network security., , , , , , and . IEEE Commun. Mag., 53 (4): 45-51 (2015)Eliminating Control Plane Overload via Measurement Task Placement., , , , , , and . IEEE/ACM Trans. Netw., 31 (4): 1717-1731 (August 2023)A Review of Geological Applications of High-Spatial-Resolution Remote Sensing Data., , , and . J. Circuits Syst. Comput., 29 (6): 2030006:1-2030006:23 (2020)Empowering Network Security With Programmable Switches: A Comprehensive Survey., , , , , , , and . IEEE Commun. Surv. Tutorials, 25 (3): 1653-1704 (2023)An Approach for Crowd Density and Crowd Size Estimation., , , , and . J. Softw., 9 (3): 757-762 (2014)Towards desirable decision boundary by Moderate-Margin Adversarial Training., , , , , , and . Pattern Recognit. Lett., (September 2023)A secure routing model based on distance vector routing algorithm., , , , , and . Sci. China Inf. Sci., 57 (1): 1-13 (2014)Efficient middlebox scaling for virtualized intrusion prevention systems in software-defined networks., , , , , and . Sci. China Inf. Sci., 65 (8): 1-3 (2022)Multi-variant network address hopping to defend stealthy crossfire attack., , , , and . Sci. China Inf. Sci., (2020)