Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed Denial of Service (DDoS) detection by traffic pattern analysis., , , and . Peer-to-Peer Netw. Appl., 7 (4): 346-358 (2014)An effective privacy preserving algorithm for neighborhood-based collaborative filtering., , , , and . Future Gener. Comput. Syst., (2014)Familial Clustering for Weakly-Labeled Android Malware Using Hybrid Representation Learning., , , , , , and . IEEE Trans. Inf. Forensics Secur., (2020)Service Provisioning for Multi-source IoT Applications in Mobile Edge Computing., , , , and . ACM Trans. Sens. Networks, 18 (2): 17:1-17:25 (2022)Special Issue on Entropy-Based Applied Cryptography and Enhanced Security for Ubiquitous Computing., and . Entropy, 18 (9): 334 (2016)Low-frequency Image Deep Steganography: Manipulate the Frequency Distribution to Hide Secrets with Tenacious Robustness., , , , , and . CoRR, (2023)Special Issue: Network Attacks and Defense Systems., , and . Comput. Syst. Sci. Eng., (2008)Model Inversion Attack against Transfer Learning: Inverting a Model without Accessing It., , , , , and . CoRR, (2022)DP-Image: Differential Privacy for Image Data in Feature Space., , , , , , and . CoRR, (2021)Privacy and Fairness in Federated Learning: on the Perspective of Trade-off., , , , and . CoRR, (2023)