Author of the publication

An Intelligent File Transfer Optimization for Poor Network Conditions.

, , , , , and . SocialSec, volume 1298 of Communications in Computer and Information Science, page 234-244. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A File-Level Continuous Data Protection Scheme for Enforcing Security Baseline., , , , , and . ML4CS (1), volume 12486 of Lecture Notes in Computer Science, page 519-529. Springer, (2020)Evading PDF Malware Classifiers with Generative Adversarial Network., , , , and . CSS (1), volume 11982 of Lecture Notes in Computer Science, page 374-387. Springer, (2019)I-HMM-Based Multidimensional Network Security Risk Assessment., , , , , and . IEEE Access, (2020)An intelligent proactive defense against the client-side DNS cache poisoning attack via self-checking deep reinforcement learning., , , , , , and . Int. J. Intell. Syst., 37 (10): 8170-8197 (2022)Network Traffic Generator Based on Distributed Agent for Large-Scale Network Emulation Environment., , and . IScIDE, volume 11266 of Lecture Notes in Computer Science, page 68-79. Springer, (2018)A Cluster-Based Group Rekeying Algorithm in Mobile Ad Hoc Networks., , and . ICCNMC, volume 3619 of Lecture Notes in Computer Science, page 344-353. Springer, (2005)A VirtualXposed-Based Inline Hooking Framework for Android Native Methods., , , , , and . SocialSec, volume 1298 of Communications in Computer and Information Science, page 245-253. Springer, (2020)A heuristic fuzz test generator for Java native interface., , , , , and . SQUADE@ESEC/SIGSOFT FSE, page 1-7. ACM, (2019)Architecture of Network Environment for High-Risk Security Experimentation., , and . ICT-EurAsia, volume 7804 of Lecture Notes in Computer Science, page 479-484. Springer, (2013)Endogenous Security Defense against Deductive Attack: When Artificial Intelligence Meets Active Defense for Online Service., , , , and . IEEE Commun. Mag., 58 (6): 58-64 (2020)