Feilu Hang

According to our database1, Feilu Hang authored at least 11 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Performance Evaluation of Data-Centric Networks Based on Parallel and Distributed Architectures for Machine Intelligence Research.
Parallel Process. Lett., September, 2023

Data-centric Networking with Parallel and Distributed Architecture Performs Performance Analysis to Protect Critical Infrastructure in the Future Power System Network Based on IoT.
Parallel Process. Lett., September, 2023

2022
Network security analysis for cloud computing environment.
Int. J. Model. Simul. Sci. Comput., December, 2022

Information Security Situation in Blockchain for Secure SDN Based on Big Data in Smart Communities: Research on Information Security Situation Awareness Based on Big Data and Artificial Intelligence.
Int. J. Inf. Secur. Priv., 2022

Machine learning-based security active defence model - security active defence technology in the communication network.
Int. J. Internet Protoc. Technol., 2022

Edge Computing on Cooperative Host Security Defense System Based on Social IoT Systems.
Int. J. Distributed Syst. Technol., 2022

2021
Network security defence system based on artificial intelligence and big data technology.
Int. J. High Perform. Syst. Archit., 2021

Pervasive hybrid two-stage fusion model of intelligent wireless network security threat perception.
Int. J. High Perform. Syst. Archit., 2021

2019
Accelerating Public Key Cryptography in Android Platforms.
Proceedings of the 5th International Conference on Big Data Computing and Communications, 2019

2017
An approach to measuring semantic similarity and relatedness between concepts in an ontology.
Proceedings of the 23rd International Conference on Automation and Computing, 2017

2015
基于关联矩阵的软件演化过程结构验证 (Structure Verification Method for Software Evolution Process Based on Incidence Matrix).
计算机科学, 2015


  Loading...