Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Self-learning Rule-Based Approach for Sci-tech Compound Phrase Entity Recognition., , , , and . APWeb, volume 9313 of Lecture Notes in Computer Science, page 732-743. Springer, (2015)The Triple-Channel Model: Toward Robust and Efficient Advanced Botnets (Poster Abstract)., , , and . RAID, volume 7462 of Lecture Notes in Computer Science, page 376-377. Springer, (2012)Improving Password Guessing Using Byte Pair Encoding., , , , , and . ISC, volume 10599 of Lecture Notes in Computer Science, page 254-268. Springer, (2017)Towards an Analysis of Source-Rewriting Anonymous Systems in a Lossy Environment., , and . PDCAT, volume 3320 of Lecture Notes in Computer Science, page 613-618. Springer, (2004)Memory chunking analysis of numerical password for Chinese websites., , , , and . MILCOM, page 788-793. IEEE, (2016)An empirical analysis of family in the Tor network., , , and . ICC, page 1995-2000. IEEE, (2013)Cloud-MOM: A Content-Based Real-Time Message-Oriented Middleware for Cloud., , , , and . HPCC/SmartCity/DSS, page 750-757. IEEE, (2018)Efficient and Scalable Privacy-Preserving Similar Document Detection., , , , and . GLOBECOM, page 1-7. IEEE, (2017)Toward a Comprehensive Insight Into the Eclipse Attacks of Tor Hidden Services., , , , , and . IEEE Internet of Things Journal, 6 (2): 1584-1593 (2019)A Multiple Watermarking Algorithm for Texts Mixed Chinese and English., , and . ITQM, volume 17 of Procedia Computer Science, page 844-851. Elsevier, (2013)