Author of the publication

Towards Improving Service Accessibility by Adaptive Resource Distribution Strategy.

, , , , and . SecureComm (1), volume 152 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 535-540. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploring Stroke-Level Modifications for Scene Text Editing., , , , , and . CoRR, (2022)StegoP2P: Oblivious user-driven unobservable communications., , , , and . ICC, page 7126-7131. IEEE, (2015)Out-of-band discovery and evaluation for tor hidden services., , , , , and . SAC, page 2057-2062. ACM, (2016)Towards embedding information diffusion data for understanding big dynamic networks., , , , , , and . Neurocomputing, (2021)Generation and Distribution of Decoy Document System., , , and . ISCTCS, volume 426 of Communications in Computer and Information Science, page 123-129. Springer, (2013)A Covert Communication Method Based on User-Generated Content Sites., , , , and . ICTAI, page 1053-1056. IEEE Computer Society, (2011)A closer look at Eclipse attacks against Tor hidden services., , , , and . ICC, page 1-6. IEEE, (2017)Who are in the Darknet? Measurement and Analysis of Darknet Person Attributes., , , , , , and . DSC, page 948-955. IEEE, (2018)De-anonymizing Social Networks User via Profile Similarity., , , and . DSC, page 889-895. IEEE, (2018)An Anonymity Vulnerability in Tor., , , , and . IEEE/ACM Trans. Netw., 30 (6): 2574-2587 (2022)