From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Anomaly Detection Method Based on Normalized Mutual Information Feature Selection and Quantum Wavelet Neural Network., , , , и . Wireless Personal Communications, 96 (2): 2693-2713 (2017)A BD Group Key Negotiation Protocol based on Clustering Technology., , , и . Int. J. Perform. Eng., 16 (6): 875-882 (2020)K -Anonymous Based Anti-Positioning Security Strategy in Mobile Networks., , , , и . J. Inf. Sci. Eng., 38 (1): 121-138 (2022)A Model of Intrusion Prevention Base on Immune., , , и . IAS, стр. 441-444. IEEE Computer Society, (2009)A Network Security Situation Prediction Algorithm Based on BP Neural Network Optimized by SOA., , , и . ICAIS (2), том 12240 из Lecture Notes in Computer Science, стр. 417-427. Springer, (2020)A Physical Topology-Aware Chord Model based on ACO., , , и . J. Comput., 6 (12): 2711-2718 (2011)Design and implementation of a cloud encryption transmission scheme supporting integrity verification., , , и . Int. J. Embed. Syst., 14 (3): 218-228 (2021)Migration and Energy Aware Network Traffic Prediction Method Based on LSTM in NFV Environment., , , , и . KSII Trans. Internet Inf. Syst., 17 (3): 896-915 (марта 2023)An Unhealthy Webpage Discovery System Based on Convolutional Neural Network., , , , и . Int. J. Digit. Crime Forensics, 14 (3): 1-15 (2022)An identity-based integrity verification scheme for cloud storage in 5G environment., , и . Int. J. Comput. Appl. Technol., 64 (2): 168-177 (2020)