Author of the publication

Collective Sampling and Analysis of High Order Tensors for Chatroom Communications.

, , and . ISI, volume 3975 of Lecture Notes in Computer Science, page 213-224. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Decentralized Detector Generation in Cooperative Intrusion Detection Systems., , , , , and . SSS, volume 4838 of Lecture Notes in Computer Science, page 37-51. Springer, (2007)Efficient privacy preservation of big data for accurate data mining., , , , and . Inf. Sci., (2020)Advancements of federated learning towards privacy preservation: from federated learning to split learning., , and . CoRR, (2020)A Tool for Internet Chatroom Surveillance., , and . ISI, volume 3073 of Lecture Notes in Computer Science, page 252-265. Springer, (2004)Expander Graph based Key Distribution Mechanisms in Wireless Sensor Networks., , and . ICC, page 2262-2267. IEEE, (2006)A Survey and Analysis of the GNSS Spoofing Threat and Countermeasures., , , , and . ACM Comput. Surv., 48 (4): 64:1-64:36 (2016)Formal modelling and analysis of DNP3 secure authentication., , and . J. Netw. Comput. Appl., (2016)Collaborative Intrusion Detection Framework: Characteristics, Adversarial Opportunities and Countermeasures., , and . CollSec, USENIX Association, (2010)A trusted ecosystem for Android applications based on context-aware access control., , , and . MALWARE, page 73-78. IEEE Computer Society, (2012)Context-aware device self-configuration using self-organizing maps., , , and . OC@ICAC, page 13-22. ACM, (2011)