Author of the publication

Tag Your Fish in the Broken Net: A Responsible Web Framework for Protecting Online Privacy and Copyright.

, , , , , , , , and . CoRR, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimizing number of hidden neurons in neural networks., , and . Artificial Intelligence and Applications, page 138-143. IASTED/ACTA Press, (2007)Gas contents of galaxy groups from thermal Sunyaev-Zel'dovich effects, , , , , , and . (2017)cite arxiv:1710.06856Comment: 7 pages, 3 figures, submitted to ApJ.The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities., , , , and . IEEE Trans. Mob. Comput., 14 (11): 2376-2391 (2015)Applications of software radio for hand gesture recognition by using long training symbols., , , and . ICSPCS, page 1-5. IEEE, (2015)An Integrated Control Model for Freeway Corridor Under Nonrecurrent Congestion., , and . IEEE Trans. Vehicular Technology, 60 (4): 1404-1418 (2011)From Exposed to Exploited: Drawing the Picture of Industrial Control Systems Security Status in the Internet Age., , , , , , , and . ICISSP, page 237-248. SCITEPRESS, (2021)Extraction of If-Then Rules from Trained Neural Network and Its Application to Earthquake Prediction., , and . IEEE ICCI, page 109-115. IEEE Computer Society, (2004)Robustness May be at Odds with Stability in Adversarial Training based Feature Selection?, and . ICDM, page 1071-1076. IEEE, (2022)Entity Linking for Short Text Using Structured Knowledge Graph via Multi-Grained Text Matching., , , , and . INTERSPEECH, page 4178-4182. ISCA, (2020)Sequential State Q-learning Uplink Resource Allocation in Multi-AP 802.11be Network., , , and . VTC Fall, page 1-5. IEEE, (2022)