Author of the publication

A quantitative assessment method of network information security vulnerability detection risk based on the meta feature system of network security data.

, , , , and . KSII Trans. Internet Inf. Syst., 15 (12): 4531-4544 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An intelligent power consumption model for virtual machines under CPU-intensive workload in cloud environment., , and . Soft Comput., 21 (19): 5755-5764 (2017)Stochastic Client Selection for Federated Learning with Volatile Clients., , , and . CoRR, (2020)A Latency-Aware Multiple Data Replicas Placement Strategy for Fog Computing., , , , and . J. Signal Process. Syst., 91 (10): 1191-1204 (2019)Test Sequence Reduction of Wireless Protocol Conformance Testing to Internet of Things., , , , and . Secur. Commun. Networks, (2018)Computer-vision-based differential remeshing for updating the geometry of finite element model., and . Comput. Aided Civ. Infrastructure Eng., 37 (2): 185-203 (2022)A Power Monitoring System Based on a Multi-Component Power Model., , and . Int. J. Grid High Perform. Comput., 10 (1): 16-30 (2018)MR-LDA: An Efficient Topic Model for Classification of Short Text in Big Social Data., , , and . Int. J. Grid High Perform. Comput., 8 (4): 100-113 (2016)分布式机器学习平台与算法综述 (Survey of Distributed Machine Learning Platforms and Algorithms)., , , and . 计算机科学, 46 (3): 9-18 (2019)Budget-deadline constrained approach for scientific workflows scheduling in a cloud environment., , , , and . Clust. Comput., 26 (3): 1737-1751 (2023)PDMA: Probabilistic service migration approach for delay-aware and mobility-aware mobile edge computing., , , , , and . Softw. Pract. Exp., 52 (2): 394-414 (2022)