Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Trusted Services: Result Verification Schemes for MapReduce., , and . CCGRID, page 41-48. IEEE Computer Society, (2012)Toward Software Diversity in Heterogeneous Networked Systems., , and . DBSec, volume 8566 of Lecture Notes in Computer Science, page 114-129. Springer, (2014)Multi-objective software assignment for active cyber defense., , and . CNS, page 299-307. IEEE, (2015)An Evaluation Framework for Moving Target Defense Based on Analytic Hierarchy Process., , and . EAI Endorsed Trans. Security Safety, 4 (13): e4 (2018)A software assignment algorithm for minimizing worm damage in networked systems., , , and . J. Inf. Secur. Appl., (2017)Discovering Persistent Subgraph Patterns over Streaming Graphs., , , and . DASFAA (3), volume 13945 of Lecture Notes in Computer Science, page 154-171. Springer, (2023)A new fuzzy PID-like controller., , and . SMC, page 3629-3634. IEEE, (2000)Multi-scale ResNet for real-time underwater object detection., , , and . Signal Image Video Process., 15 (5): 941-949 (2021)Data Path Allocation Based on Bipartite Weighted Matching., , , and . DAC, page 499-504. IEEE Computer Society Press, (1990)Congruence Synchronous Mirror Delay., , and . ISCAS, page 2184-2187. IEEE, (2007)