508 results on '"Chunming Wu"'
Search Results
152. HSTS Measurement and an Enhanced Stripping Attack Against HTTPS.
153. H _2 DoS: An Application-Layer DoS Attack Towards HTTP/2 Protocol.
154. Fighting Against Deepfake: Patch&Pair Convolutional Neural Networks (PPCNN).
155. 虚拟网映射问题的计算复杂性分析 (Computational Complexity Analysis of Virtual Network Mapping Problem).
156. Generating stable biometric keys for flexible cloud computing authentication using finger vein.
157. PAME: Evolutionary membrane computing for virtual network embedding.
158. Wireless big data in cellular networks: the cornerstone of smart cities.
159. Easy Path Programming: Elevate Abstraction Level for Network Functions.
160. SDN-RDCD: A Real-Time and Reliable Method for Detecting Compromised SDN Devices.
161. Fault Diagnosis Method of Rolling Bearing Based on MSCNN-LSTM.
162. Infrared and Visible Image Fusion Based on Res2Net-Transformer Automatic Encoding and Decoding.
163. Multi-Discriminator Image Restoration Algorithm Based on Hybrid Dilated Convolution Networks.
164. EI-MTD: Moving Target Defense for Edge Intelligence against Adversarial Attacks.
165. Deep Graph Matching and Searching for Semantic Code Retrieval.
166. Towards Imperceptible Adversarial Image Patches Based on Network Explanations.
167. Hierarchical Graph Matching Networks for Deep Graph Similarity Learning.
168. UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers.
169. Multi-variant network address hopping to defend stealthy crossfire attack.
170. Engineering traffic uncertainty in the OpenFlow data plane.
171. Adaptive IP Mutation: A Proactive Approach for Defending against Worm Propagation.
172. Scott S. Williams and Roberto Junco, Editors: The Archaeology of Manila Galleons in the American Continent: The Wrecks of Baja California, San Agustín, and Santo Cristo de Burgos (Oregon)
173. Research of The WSN Routing based on Artificial Bee Colony Algorithm.
174. SDN-LIRU: A Lossless and Seamless Method for SDN Inter-Domain Route Updates.
175. The Implementation of Virtualization in Data Plane of For CES.
176. Embedding Algorithm for Virtualizing Content-Centric Networks in a Shared Substrate.
177. Intelligent Orchestrating of IoT Microservices Based on Reinforcement Learning
178. Extensional magmatism caused by strain partitioning: insights from the mafic dikes hosted in Biesituobie batholith in West Junggar, CAOB
179. Identification of continental fragments in orogen: an example from Dunhuang Orogenic Belt, northwestern China
180. Adversarial Examples versus Cloud-based Detectors: A Black-box Empirical Study.
181. V-Fuzz: Vulnerability-Oriented Evolutionary Fuzzing.
182. Dynamic backup sharing scheme of service function chains in NFV
183. Traffic matrix estimation: A neural network approach with extended input and expectation maximization iteration.
184. Virtual network mapping for multi-domain data plane in Software-Defined Networks.
185. Programming network via Distributed Control in Software-Defined Networks.
186. Prototype for customized multicast services in software defined networks.
187. AdaFlow: Adaptive Control to Improve Availability of OpenFlow Forwarding for Burst Quantity of Flows.
188. An efficient virtual network embedding algorithm with delay constraints.
189. Lightweight Authentication Protocol Based on Physical Unclonable Function
190. Associating Labels and Elements of Deep Web Query Interface Based on DOM.
191. Robust dynamic bandwidth allocation method for virtual networks.
192. Avoiding the evolved node B buffer overflow by using advertisement window control.
193. A two-layer traffic clustering framework for network virtualization.
194. BABAC: An Access Control Framework for Network Virtualization Using User Behaviors and Attributes.
195. DISCO: Memory Efficient and Accurate Flow Statistics for Network Measurement.
196. Mapping Multicast Service-Oriented Virtual Networks with Delay and Delay Variation Constraints.
197. 虚拟网映射竞争算法设计与分析 (Design and Analysis of Virtual Network Mapping Competitive Algorithms).
198. A mixture language model for the classification of Chinese online reviews.
199. Evolving defense mechanism for future network security.
200. Governance framework for voice spam detection and interception of telecom network
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.