Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

URL Based Gateway Side Phishing Detection Method., , , and . Trustcom/BigDataSE/ISPA, page 268-275. IEEE, (2016)Fed-CBS: A Heterogeneity-Aware Client Sampling Mechanism for Federated Learning via Class-Imbalance Reduction., , , , , , , , and . CoRR, (2022)Identifying Influential Nodes in Complex Networks Based on Neighborhood Entropy Centrality., , , and . Comput. J., 64 (10): 1465-1476 (2021)Ultrannel: Ultrasound based Covert Communication Channel., , , , , , and . SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta, page 1760-1767. IEEE, (2022)Variance Reduction in Stochastic Particle-Optimization Sampling., , and . ICML, volume 119 of Proceedings of Machine Learning Research, page 11307-11316. PMLR, (2020)Medical Protocol Security: DICOM Vulnerability Mining Based on Fuzzing Technology., , , , , and . CCS, page 2549-2551. ACM, (2019)Gemini-Chain: A Regulatable Digital Currency Model based on Blockchain., , , , , and . INFOCOM Workshops, page 760-765. IEEE, (2020)Automated Mapping of Real-world Oncology Laboratory Data to LOINC., , , , , and . AMIA, AMIA, (2021)Fake User Detection Based on Multi-Model Joint Representation., , , , and . Inf., 15 (5): 266 (May 2024)ARTIST: Improving the Generation of Text-rich Images by Disentanglement., , , , , , , and . CoRR, (2024)