Author of the publication

Extensible Command Parsing Method for Network Device.

, , , and . CISIS, page 462-467. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Chaotic modulations for digital underwater acoustic communications., , , and . WUWNet, page 10:1-10:2. ACM, (2013)Who Is Visible: Resolving Access Policy Conflicts in Online Social Networks., , , , and . GLOBECOM, page 1-6. IEEE, (2017)Monitoring-based Differential Privacy Mechanism Against Query-Flooding Parameter Duplication Attack., , , , , and . CoRR, (2020)Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption., , , , and . IEEE Trans. Inf. Forensics Secur., 8 (3): 553-562 (2013)An improved attack on clock-controlled shift registers based on hardware implementation., , , and . Sci. China Inf. Sci., 56 (11): 1-10 (2013)Research on Similarity Record Detection of Device Status Information Based on Multiple Encoding Field., , , , and . SpaCCS Workshops, volume 10658 of Lecture Notes in Computer Science, page 54-63. Springer, (2017)Efficiently Managing Large-Scale Keys in HDFS., , , , and . HPCC/DSS/SmartCity/DependSys, page 353-360. IEEE, (2021)PNT Sketch: A Generic Sketch Algorithm for Periodic Network Telemetry., , , , , and . IFIP Networking, page 1-9. IEEE, (2022)RPS: range-based path selection method for concurrent multipath transfer., , , , and . IWCMC, page 944-948. ACM, (2010)Discovering obscure looking glass sites on the web to facilitate internet measurement research., , , , , , and . CoNEXT, page 426-439. ACM, (2021)