Author of the publication

Frontier technologies of trust computing and network security.

, , , and . Concurr. Comput. Pract. Exp., 27 (12): 2907-2909 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards automated choreography of Web services using planning in large scale service repositories., , , , , , and . Appl. Intell., 41 (2): 383-404 (2014)A novel algebra to articulate feature in text dimension reduction., , and . GrC, page 132-136. IEEE Computer Society, (2013)Secure Distributed Deduplication Systems with Improved Reliability., , , , , , and . IEEE Trans. Computers, 64 (12): 3569-3579 (2015)Protecting web applications from DDoS attacks by an active distributed defense system., and . IJWIS, 2 (1): 37-44 (2006)Cooperative triangulation in MSBNs without revealing subnet structures.. Networks, 37 (1): 53-65 (2001)Multiagent Decision Making in Collaborative Decision Networks by Utility Cluster Based Partial Evaluation., and . International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 23 (2): 149-192 (2015)An Effective Deferentially Private Data Releasing Algorithm for Decision Tree., , , and . TrustCom/ISPA/IUCC, page 388-395. IEEE Computer Society, (2013)A Fast Flowgraph Based Classification System for Packed and Polymorphic Malware on the Endhost., and . AINA, page 721-728. IEEE Computer Society, (2010)A New Active Contour Method Based on Elastic Interaction., , and . CVPR (1), page 452-457. IEEE Computer Society, (2005)Simple linear algorithms for mining graph cores.. CoRR, (2014)