Author of the publication

Memory chunking analysis of numerical password for Chinese websites.

, , , , and . MILCOM, page 788-793. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Memory chunking analysis of numerical password for Chinese websites., , , , and . MILCOM, page 788-793. IEEE, (2016)An empirical analysis of family in the Tor network., , , and . ICC, page 1995-2000. IEEE, (2013)Cloud-MOM: A Content-Based Real-Time Message-Oriented Middleware for Cloud., , , , and . HPCC/SmartCity/DSS, page 750-757. IEEE, (2018)Efficient and Scalable Privacy-Preserving Similar Document Detection., , , , and . GLOBECOM, page 1-7. IEEE, (2017)Toward a Comprehensive Insight Into the Eclipse Attacks of Tor Hidden Services., , , , , and . IEEE Internet of Things Journal, 6 (2): 1584-1593 (2019)A Self-learning Rule-Based Approach for Sci-tech Compound Phrase Entity Recognition., , , , and . APWeb, volume 9313 of Lecture Notes in Computer Science, page 732-743. Springer, (2015)The Triple-Channel Model: Toward Robust and Efficient Advanced Botnets (Poster Abstract)., , , and . RAID, volume 7462 of Lecture Notes in Computer Science, page 376-377. Springer, (2012)Improving Password Guessing Using Byte Pair Encoding., , , , , and . ISC, volume 10599 of Lecture Notes in Computer Science, page 254-268. Springer, (2017)Towards an Analysis of Source-Rewriting Anonymous Systems in a Lossy Environment., , and . PDCAT, volume 3320 of Lecture Notes in Computer Science, page 613-618. Springer, (2004)Evicting and filling attack for linking multiple network addresses of Bitcoin nodes., , , , , , and . Cybersecur., 6 (1): 50 (December 2023)