Author of the publication

Modeling and Vulnerable Points Analysis for E-commerce Transaction System with a Known Attack.

, , , and . SpaCCS, volume 10066 of Lecture Notes in Computer Science, page 422-436. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MPTR: A Maximal-Marginal-Relevance-Based Personalized Trip Recommendation Method., , , and . IEEE Trans. Intell. Transp. Syst., 19 (11): 3461-3474 (2018)An Accuracy-and-Diversity-based Ensemble Method for Concept Drift and Its application in Fraud Detection., , , , and . ICDM (Workshops), page 875-882. IEEE, (2020)Petri Nets Based Verification of Epistemic Logic and Its Application on Protocols of Privacy and Security., and . SERVICES, page 25-28. IEEE, (2020)Enhancing the robustness of QMIX against state-adversarial attacks., , , , and . Neurocomputing, (March 2024)Petri Net Based Symbolic Model Checking for Computation Tree Logic of Knowledge., and . CoRR, (2020)Random forest for credit card fraud detection., , , , , and . ICNSC, page 1-6. IEEE, (2018)Global and Local Confidence Based Fraud Detection Graph Neural Network., , and . CoRR, (2024)A Rich Ranking Model Based on the Matthew Effect Optimization., and . CSoNet, volume 11280 of Lecture Notes in Computer Science, page 450-459. Springer, (2018)A Heuristic Method of Detecting Data Inconsistency Based on Petri Nets., , , , and . SMC, page 202-208. IEEE, (2018)DICER: Data Inconsistency CheckER based on the unfolding technique of Petri net., , , and . ICNSC, page 115-120. IEEE, (2017)