Author of the publication

Detection and Defense of SYN Flood Attacks Based on Dual Stack Network Firewall.

, , , , , and . DSC, page 526-531. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lightweight Anonymous Geometric Routing for Internet of Things., , , , , , and . IEEE Access, (2019)A data-driven method for future Internet route decision modeling., , , , , and . Future Gener. Comput. Syst., (2019)Privacy-Preserving Convolutional Neural Network Classification Scheme With Multiple Keys., , , , , , and . IEEE Trans. Serv. Comput., 17 (1): 322-335 (January 2024)Salaxy: Enabling USB Debugging Mode Automatically to Control Android Devices., , , , , and . IEEE Access, (2019)Personalized sampling graph collection with local differential privacy for link prediction., , , , and . World Wide Web (WWW), 26 (5): 2669-2689 (September 2023)Power Grid-Oriented Cascading Failure Vulnerability Identifying Method Based on Wireless Sensors., , , , and . J. Sensors, (2021)A Blockchain-Empowered Federated Learning in Healthcare-Based Cyber Physical Systems., , , , , and . IEEE Trans. Netw. Sci. Eng., 10 (5): 2685-2696 (September 2023)DeepAutoD: Research on Distributed Machine Learning Oriented Scalable Mobile Communication Security Unpacking System., , , , , and . IEEE Trans. Netw. Sci. Eng., 9 (4): 2052-2065 (2022)A novel routing verification approach based on blockchain for inter-domain routing in smart metropolitan area networks., , , , , , and . J. Parallel Distributed Comput., (2020)Diverse classifiers with label dependencies for long-tail relation extraction in big data., , , , , , and . Comput. Electr. Eng., (September 2023)