Author of the publication

Network Security Situation Assessment Approach Based on Attack-Defense Stochastic Game Model.

, , , and . ICCCS (3), volume 11065 of Lecture Notes in Computer Science, page 161-173. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Linguistic Steganalysis by Enhancing and Integrating Local and Global Features., , and . IEEE Signal Process. Lett., (2023)Evolutionary machine learning builds smart education big data platform: Data-driven higher education., , , , , and . Appl. Soft Comput., (March 2023)Intelligent green production of raw materials in ceramic technology of choice., and . EMEIT, page 897-900. IEEE, (2011)Wavelet neural network based intelligent assessment of ceramic green technology research., and . EMEIT, page 901-904. IEEE, (2011)How Older Adults' Moments Sharing in SNS Contributes to Their Subjective Well-Being?, , , and . WHICEB (1), volume 480 of Lecture Notes in Business Information Processing, page 143-155. Springer, (2023)A CNN Based Visual Audio Steganography Model., , , , and . ICAIS (1), volume 13338 of Lecture Notes in Computer Science, page 431-442. Springer, (2022)Research on Energy Saving Mechanism of NB-IoT Based on eDRX., , and . VTC Spring, page 1-6. IEEE, (2021)Robust Secret Data Hiding for Transformer-based Neural Machine Translation., , , , and . IJCNN, page 1-8. IEEE, (2023)An empirical study on program failures of deep learning jobs., , , , , and . ICSE, page 1159-1170. ACM, (2020)Chinese Short Text Entity Linking Model Based on PET., , , , , and . WSSE, page 87-92. ACM, (2022)