Author of the publication

Identification of encrypted and malicious network traffic based on one-dimensional convolutional neural network.

, , , , , , , , and . J. Cloud Comput., 12 (1): 53 (December 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Video Watermarking Scheme Based on Multi-Algorithm Selection., , , and . IIH-MSP, page 252-255. IEEE, (2012)Optimization of landscape ecological pattern in abandoned mines based on GIS., , , and . Geoinformatics, page 1-5. IEEE, (2010)An application of IEEE802.15.4/ZigBee simulation model., and . ICSAI, page 674-679. IEEE, (2016)Review of intelligent video surveillance technology research., , , , and . EMEIT, page 230-233. IEEE, (2011)The research about the framework and key technology for edge intelligent instrument., , and . CONF-CDS, page 74:1-74:5. ACM, (2021)Traffic Congestion Forecasting Based on Possibility Theory., , and . Int. J. Intelligent Transportation Systems Research, 14 (2): 85-91 (2016)Incorporating Description Embeddings into Medical Knowledge Graphs Representation Learning., , , , and . HCC, volume 11354 of Lecture Notes in Computer Science, page 188-194. Springer, (2018)Network pharmacology reveals the multiple mechanisms of Xiaochaihu decoction in the treatment of non-alcoholic fatty liver disease., , , , , , , , , and . BioData Min., 13 (1): 11 (2020)Deep Feature-Review Transmit Network of Contour-Enhanced Road Extraction From Remote Sensing Images., , , , and . IEEE Geosci. Remote. Sens. Lett., (2022)A Q-learning method based on coarse-to-fine potential energy surface for locating transition state and reaction pathway., , , , , , and . J. Comput. Chem., 45 (8): 487-497 (March 2024)