Author of the publication

Research and implementation of the sustainable development information sharing Web service system of China.

, , , , and . IGARSS, page 3. IEEE, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computation of universal unfolding of the double zero bifurcation in the Z2-symmetric system., and . Int. J. Comput. Math., 91 (3): 461-479 (2014)Research on WEBGIS real-time distribution system of port navigation-supporting information., , , , and . IGARSS, page 3. IEEE, (2005)Generalized projective synchronization of fractional order chaotic systems, , and . Physica A: Statistical Mechanics and its Applications, 387 (14): 3738--3746 (Jun 1, 2008)An Efficient SCA Leakage Model Construction Method Under Predictable Evaluation., , , , , , and . IEEE Trans. Inf. Forensics Secur., 13 (12): 3008-3018 (2018)Towards Transparent and Stealthy Android OS Sandboxing via Customizable Container-Based Virtualization., , , , , , and . CCS, page 2858-2874. ACM, (2021)JTaint: Finding Privacy-Leakage in Chrome Extensions., , , , and . ACISP, volume 12248 of Lecture Notes in Computer Science, page 563-583. Springer, (2020)Research on 3D Simulation Technology Applied in Navigation-Aid Management., , and . CW, page 597-600. IEEE Computer Society, (2008)Deep Learning-Based Anomaly Detection in Cyber-Physical Systems: Progress and Opportunities., , , , and . CoRR, (2020)MetaBox: A Benchmark Platform for Meta-Black-Box Optimization with Reinforcement Learning., , , , , , , and . CoRR, (2023)Obfuscation-Resilient Executable Payload Extraction From Packed Malware., , , , , , and . USENIX Security Symposium, page 3451-3468. USENIX Association, (2021)