![]() |
| 2007 | ||
|---|---|---|
| 3 | EE | Hai-Jun Xiao, Fan Hong, Zhao-Li Zhang, Junguo Liao: Intrusion Detection Using Ensemble of SVM Classifiers. FSKD (4) 2007: 45-49 |
| 2006 | ||
| 2 | EE | Zhao-Li Zhang, Fan Hong, Junguo Liao: Modeling Chinese Wall Policy Using Colored Petri Nets. CIT 2006: 162 |
| 2005 | ||
| 1 | EE | Xian Zhu, Shaobin Wang, Fan Hong, Junguo Liao: Distributed Credential Chain Discovery in Trust-Management with Parameterized Roles. CANS 2005: 334-348 |
| 1 | Fan Hong | [1] [2] [3] |
| 2 | Shaobin Wang | [1] |
| 3 | Hai-Jun Xiao | [3] |
| 4 | Zhao-Li Zhang | [2] [3] |
| 5 | Xian Zhu | [1] |