Author of the publication

Deep Adversarial Learning in Intrusion Detection: A Data Augmentation Enhanced Framework.

, , , , and . CoRR, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A platform for multiple DC corona effects measurements and analysis., , , , , and . I2MTC, page 181-186. IEEE, (2015)Joint Battery-Buffer Sustainable Guarantees in Energy-Harvesting Enabled Wireless Networks., , , and . GLOBECOM, page 1-6. IEEE, (2015)LinearPartition: Linear-Time Approximation of RNA Folding Partition Function and Base Pairing Probabilities., , , and . CoRR, (2019)Optimal VMD-Based Signal Denoising for Laser Radar via Hausdorff Distance and Wavelet Transform., , , , , , , and . IEEE Access, (2019)Towards Technology Independent Strategies for SOA Implementations., , and . ENASE, page 143-154. SciTePress, (2011)Circumstantial-evidence-based Judgment for Software Effort Estimation., , and . EAST, page 18-27. SciTePress, (2011)A Factor Framework for Experimental Design for Performance Evaluation of Commercial Cloud Services, , , and . CoRR, (2013)BPGAN: Bidirectional CT-to-MRI prediction using multi-generative multi-adversarial nets with spectral normalization and localization., , , , , and . Neural Networks, (2020)DEFOR: depth- and frequency-based somatic copy number alteration detector., , , and . Bioinform., 35 (19): 3824-3825 (2019)On evaluating commercial Cloud services: A systematic review., , , , and . J. Syst. Softw., 86 (9): 2371-2393 (2013)