Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cross-site Scripting Attacks on Android Hybrid Applications., , , and . ICCSP, page 56-61. ACM, (2017)OPUVRE: Overall Performance for Urban Vehicle Routing Environments., and . IOV, volume 8662 of Lecture Notes in Computer Science, page 120-129. Springer, (2014)Simdedup: A New Deduplication Scheme Based on Simhash., and . WAIM Workshops, volume 7901 of Lecture Notes in Computer Science, page 79-88. Springer, (2013)Analysis of cars' commuting behavior under license plate restriction policy: a case study in Hangzhou, China., , , and . ITSC, page 236-241. IEEE, (2018)Applying gated recurrent units pproaches for workload prediction., and . NOMS, page 1-6. IEEE, (2018)A large scale transactional service selection approach based on skyline and ant colony optimization algorithm., , and . NOMS, page 1-7. IEEE, (2018)T-Broker: A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services., , , and . IEEE Trans. Inf. Forensics Secur., 10 (7): 1402-1415 (2015)Fast and Parallel Trust Computing Scheme Based on Big Data Analysis for Collaboration Cloud Service., , , and . IEEE Trans. Inf. Forensics Secur., 13 (8): 1917-1931 (2018)A Context-Aware S-Health Service System for Drivers., , and . Sensors, 17 (3): 609 (2017)A Node-labeling-based Method for Evaluating the Anonymity of Tor Network., , , , and . COMPSAC, page 773-778. IEEE, (2022)