Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MagBox: Keep the risk functions running safely in a magic box., , , , , and . Future Gener. Comput. Syst., (2023)Trust Based Access Control Policy in Multi-domain of Cloud Computing., , and . J. Comput., 8 (5): 1357-1365 (2013)Automated Speech Recognition System for Dispatching Call Recordings in The Underground Coal Mines., , , , , , , , and . SPML, page 363-367. ACM, (2023)Multi-copy dynamic cloud data auditing model based on IMB tree., , , , and . Enterp. Inf. Syst., 15 (2): 248-269 (2021)Improved t-SNE in Anomaly Detection of Cloud Virtual Machine., , , , , and . Enterp. Inf. Syst., (March 2023)KPointer: Keep the code pointers on the stack point to the right code., , , , , and . Comput. Secur., (2022)A Novel Clustering Algorithm Based on Graph Matching., , , and . J. Softw., 8 (4): 1035-1041 (2013)A Robust Blind Audio Watermarking Scheme Based on Singular Value Decomposition and Neural Networks., , , , and . Int. J. Comput. Intell. Syst., 7 (5): 865-873 (2014)Role-Based Access Control System for Web Services., , , and . CIT, page 357-362. IEEE Computer Society, (2004)MProbe: Make the code probing meaningless., , , , and . ACSAC, page 214-226. ACM, (2022)