Ma, Zuchao
75  Ergebnisse:
Personensuche X
?
4

Understanding Vulnerability Inducing Commits of the Linux K..:

Jiang, Muhui ; Jiang, Jinan ; Wu, Tao...
ACM Transactions on Software Engineering and Methodology.  , 2024
 
?
5

ADCL: Toward an Adaptive Network Intrusion Detection System..:

Ma, Zuchao ; Liu, Liang ; Meng, Weizhi...
IEEE Internet of Things Journal.  10 (2023)  14 - p. 12521-12536 , 2023
 
?
8

Secure K-Nearest neighbor queries in two-tiered mobile wire..:

Fan, Lihong ; Liu, Liang ; Gao, Hang..
Digital Communications and Networks.  7 (2021)  2 - p. 247-256 , 2021
 
?
11

ORMD: Online Learning Real-Time Malicious Node Detection fo..:

, In: Lecture Notes in Computer Science; Wireless Algorithms, Systems, and Applications,
Yang, Jingxiu ; Zhou, Lu ; Liu, Liang. - p. 494-509 , 2021
 
?
13

Defending co‐resident attack using reputation‐based virtual..:

Xiao, Yiming ; Liu, Liang ; Ma, Zuchao..
Transactions on Emerging Telecommunications Technologies.  32 (2021)  9 - p. , 2021
 
1-15