Author of the publication

FLOWGUARD: building robust firewalls for software-defined networks.

, , , and . HotSDN, page 97-102. ACM, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security and Privacy Mechanisms for Sensor Middleware and Application in Internet of Things (IoT)., , and . IJDSN, 12 (1): 2965438:1-2965438:3 (2016)Enabling Performant, Flexible and Cost-Efficient DDoS Defense With Programmable Switches., , , , , , , , , and . IEEE/ACM Trans. Netw., 29 (4): 1509-1526 (2021)Efficient construction of provably secure steganography under ordinary covert channels., , , , and . Sci. China Inf. Sci., 55 (7): 1639-1649 (2012)Dual-Level Knowledge Distillation via Knowledge Alignment and Correlation., , , , and . IEEE Trans. Neural Networks Learn. Syst., 35 (2): 2425-2435 (February 2024)COVID-19 and Sinophobia: Detecting Warning Signs of Radicalization on Twitter and Reddit., , , , , and . Cyberpsychology Behav. Soc. Netw., 26 (7): 546-553 (July 2023)Cybersecurity Attacks in Vehicle-to-Infrastructure (V2I) Applications and their Prevention., , , and . CoRR, (2017)Chain-of-Thought Prompting of Large Language Models for Discovering and Fixing Software Vulnerabilities., , , , , and . CoRR, (2024)Secure and efficient random functions with variable-length output., , , , and . J. Netw. Comput. Appl., (2014)Problematic Privacy Policies of Voice Assistant Applications., , , , and . IEEE Secur. Priv., 19 (6): 66-73 (2021)An Investigation of Large Language Models for Real-World Hate Speech Detection., , , , , , and . ICMLA, page 1568-1573. IEEE, (2023)