Author of the publication

Correlating processes for automatic memory evidence analysis.

, , , , , and . INFOCOM Workshops, page 115-120. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Correlating processes for automatic memory evidence analysis., , , , , and . INFOCOM Workshops, page 115-120. IEEE, (2015)Matrix partition-based detection scheme for false data injection in smart grid., , and . Int. J. Wirel. Mob. Comput., 9 (3): 250-256 (2015)Analysis and Extension of Safety Mechanisms for Standardized Control Networks in Smart Grid., , , , and . IJDSN, (2014)A Textual Adversarial Attack Scheme for Domain-Specific Models., , , , and . ML4CS (2), volume 13656 of Lecture Notes in Computer Science, page 104-117. Springer, (2022)Achieving Secure and Efficient Cloud Search Services: Cross-Lingual Multi-Keyword Rank Search Over Encrypted Cloud Data., , , , , and . ICC, page 1-6. IEEE, (2019)Achieving differential privacy against non-intrusive load monitoring in smart grid: A fog computing approach., , , , and . Concurr. Comput. Pract. Exp., (2019)The Permission Delegation Mechanism for P2P Network., , , and . FGCN (2), page 303-308. IEEE Computer Society, (2007)Verification Code Recognition Based on Active and Deep Learning., , , , , , and . CoRR, (2019)A Multi-Feature Based Automatic Approach to Geospatial Record Linking., , , , , , , and . Int. J. Semantic Web Inf. Syst., 14 (4): 73-91 (2018)An Efficient and Privacy-Preserving Energy Trading Scheme Based on Blockchain., , , , , and . GLOBECOM, page 1-6. IEEE, (2019)