Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Patch-Related Vulnerability Detection Based on Symbolic Execution., , , , , and . IEEE Access, (2017)CloudAC: a cloud-oriented multilayer access control system for logic virtual domain., , , , , and . IET Inf. Secur., 7 (1): 51-59 (2013)Proactive recovery approach for intrusion tolerance with dynamic configuration of physical and virtual replicas., , , , , and . Secur. Commun. Networks, 5 (10): 1169-1180 (2012)A Skip-gram-based Framework to Extract Knowledge from Chinese Reviews in Cloud Environment., , , and . Mob. Networks Appl., 20 (3): 363-369 (2015)Defending Against Flow Table Overloading Attack in Software-Defined Networks., , , , , and . IEEE Trans. Serv. Comput., 12 (2): 231-246 (2019)CloudCFI: Context-Sensitive and Incremental CFI in the Cloud Environment., , , , and . IEEE Trans. Cloud Comput., 9 (3): 938-957 (2021)CloudTB: A quick and reliable testbed for virtual machine based cloud computing systems., , , , and . CONIELECOMP, page 40-47. IEEE, (2015)Research on Group Signature Scheme with Forward Security., , , and . J. Comput. Res. Dev., 43 (12): 2069-2075 (2006)DRIC: Dependable Grid Computing Framework., , , and . IEICE Trans. Inf. Syst., 89-D (2): 612-623 (2006)Reliability Analysis for Grid Computing., , , and . GCC, volume 3251 of Lecture Notes in Computer Science, page 787-790. Springer, (2004)