Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure V2X Communication Network based on Intelligent PKI and Edge Computing., , and . IEEE Netw., 34 (2): 172-178 (2020)All-Or-Nothing data protection for ubiquitous communication: Challenges and perspectives., , , , and . Inf. Sci., (2019)LAAEM: A Method to Enhance LDoS Attack., , , , , and . IEEE Communications Letters, 20 (4): 708-711 (2016)Estimating Web Attack Detection via Model Uncertainty from Inaccurate Annotation., , , , , , , and . CSCloud/EdgeCom, page 53-58. IEEE, (2019)HAPE: A programmable big knowledge graph platform., , , , , , and . Inf. Sci., (2020)Interpreting AI for Networking: Where We Are and Where We Are Going., , , , , and . IEEE Commun. Mag., 60 (2): 25-31 (2022)Topological Graph Convolutional Network-Based Urban Traffic Flow and Density Prediction., , , , , and . IEEE Trans. Intell. Transp. Syst., 22 (7): 4560-4569 (2021)An integrated model based on feedforward neural network and Taylor expansion for indicator correlation elimination., , , , and . Intell. Data Anal., 26 (3): 751-783 (2022)Investigating Image Applications Based on Spatial-Frequency Transform and Deep Learning Techniques., , , and . CoRR, (2020)Interpreting Deep Learning Models in Natural Language Processing: A Review., , , , , , , , and . CoRR, (2021)