Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reputation-Based Byzantine Fault-Tolerance for Consortium Blockchain., , , and . ICPADS, page 604-611. IEEE, (2018)Efficient Flow Recording with InheritSketch on Programmable Switches., , , , , , and . ICDCS, page 1-11. IEEE, (2023)Soter: Deep Learning Enhanced In-Network Attack Detection Based on Programmable Switches., , , , , , , , and . SRDS, page 225-236. IEEE, (2022)PUFF: A Passive and Universal Learning-based Framework for Intra-domain Failure Detection., , , , , , and . IPCCC, page 1-8. IEEE, (2021)Survey on Blockchain Incentive Mechanism., , , , , , and . ICPCSEE (1), volume 1058 of Communications in Computer and Information Science, page 386-395. Springer, (2019)DGEM: A New Dual-modal Graph Embedding Method in Recommendation System., , , , and . CoRR, (2021)LAFS: Learning-Based Application-Agnostic Flow Scheduling for Datacenters., , , , , , and . IPCCC, page 1-8. IEEE, (2021)Blockchain-Based Secure Authentication Scheme for Medical Data Sharing., , , , , and . ICPCSEE (1), volume 1058 of Communications in Computer and Information Science, page 396-411. Springer, (2019)Statistical Optimal Hash-Based Longest Prefix Match., , , , , and . ANCS, page 153-164. IEEE Computer Society, (2017)