Author of the publication

Entropy-Based Denial of Service Attack Detection in Cloud Data Center.

, , , , and . CBD, page 201-207. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A fast algorithm for image segmentation based on fuzzy region competition., , and . Adv. Comput. Math., 37 (4): 521-542 (2012)New Variational Formulations for Level Set Evolution Without Reinitialization with Applications to Image Segmentation., , , , and . J. Math. Imaging Vis., 41 (3): 194-209 (2011)Nonlocal total variation models for multiplicative noise removal using split Bregman iteration., , and . Math. Comput. Model., 55 (3-4): 939-954 (2012)Research of spatial topological relation model based on GeoSOT., , , , and . IGARSS, page 786-789. IEEE, (2013)Soft-bit correction with robust quantize-and-forward for physical layer network coding in two-way relay fading channel., and . ICC, page 2506-2510. IEEE, (2012)Complex Low Density Lattice Codes to Physical Layer Network Coding., , and . ICC, page 2060-2065. IEEE, (2015)Vocal music teaching method using fuzzy logic approach for musical performance evaluation., and . J. Intell. Fuzzy Syst., 45 (6): 9289-9302 (December 2023)Enabling application-aware flexible graph partition mechanism for parallel graph processing systems., , , , and . Concurr. Comput. Pract. Exp., (2017)Mapping the Technological Landscape of Emerging Industry Value Chain Through a Patent Lens: An Integrated Framework With Deep Learning., , and . IEEE Trans. Engineering Management, 69 (6): 3367-3378 (2022)Model-Aware Parallelization Strategy for Deep Neural Networks' Distributed Training., and . CBD, page 61-66. IEEE, (2019)