Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of a software-defined resilient virtualized networking environment., , , and . DRCN, page 111-114. IEEE, (2015)Modeling of Local False Data Injection Attacks With Reduced Network Information., , , and . IEEE Trans. Smart Grid, 6 (4): 1686-1696 (2015)Transmission Line Rating Attack in Two-Settlement Electricity Markets., , , and . IEEE Trans. Smart Grid, 7 (3): 1346-1355 (2016)Informed dynamic scheduling strategies for novel majority-logic decoding of non-binary LDPC codes., and . ICSPCS, page 1-6. IEEE, (2015)Implementing a Personal Health Record Cloud Platform Using Ciphertext-Policy Attribute-Based Encryption., , and . INCoS, page 8-14. IEEE, (2012)Image registration algorithm based on point features of sub-pixel., , and . IGARSS, page 501-504. IEEE, (2015)ENDA: embracing network inconsistency for dynamic application offloading in mobile cloud computing., , , and . MCC@SIGCOMM, page 39-44. ACM, (2013)Direction as a Spatial Object: A Summary of Results., and . ACM-GIS, page 69-75. ACM, (1998)Detection of novel tandem duplication with next-generation sequencing., , , , and . BCB, page 415-419. ACM, (2011)DuReader: a Chinese Machine Reading Comprehension Dataset from Real-world Applications, , , , , , , , , and 3 other author(s). (2017)cite arxiv:1711.05073Comment: 10 pages, ACL 2018 MRQA Workshop camera-ready version.