Author of the publication

Exploring key hackers and cybersecurity threats in Chinese hacker communities.

, , , , , , , and . ISI, page 13-18. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Collective Intelligence - How Collaborative Contents and Social Media Changing the Face of Digital Library., , and . WEBIST, page 349-354. SciTePress, (2013)A Package Generation and Recommendation Framework Based on Travelogues., , , , and . COMPSAC, page 692-701. IEEE Computer Society, (2015)An Efficient Framework for Exact Set Similarity Search Using Tree Structure Indexes., , , , , and . ICDE, page 759-770. IEEE Computer Society, (2017)Energy Efficient Sleep Mode Activation Scheme for Small Cell Networks., , , , and . VTC Fall, page 1-4. IEEE, (2015)HuaVideo: Towards a Secure, Scalable and Compatible HTML5 Video Providing System., , , , and . IEEE WISA, page 81-85. IEEE Computer Society, (2014)Named Entity Recognition in Chinese Electronic Medical Records Based on CRF., , , and . WISA, page 105-110. IEEE, (2017)A New Electronic Records Security Model for Long-Term Preservation., , , and . IEEE WISA, page 191-194. IEEE Computer Society, (2013)Fihuo: A Moblie Smart Health Service Platform., , , , and . IEEE WISA, page 179-183. IEEE Computer Society, (2015)Energy management on DVS based coarse-grained reconfigurable platform., , , , and . NANOARCH, page 49-54. ACM, (2016)A Semantic++ MapReduce: A Preliminary Report., , , , , and . ICSC, page 330-336. IEEE Computer Society, (2014)