Author of the publication

Identification of encrypted and malicious network traffic based on one-dimensional convolutional neural network.

, , , , , , , , and . J. Cloud Comput., 12 (1): 53 (December 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Video Watermarking Scheme Based on Multi-Algorithm Selection., , , and . IIH-MSP, page 252-255. IEEE, (2012)An application of IEEE802.15.4/ZigBee simulation model., and . ICSAI, page 674-679. IEEE, (2016)Optimization of landscape ecological pattern in abandoned mines based on GIS., , , and . Geoinformatics, page 1-5. IEEE, (2010)The research about the framework and key technology for edge intelligent instrument., , and . CONF-CDS, page 74:1-74:5. ACM, (2021)Review of intelligent video surveillance technology research., , , , and . EMEIT, page 230-233. IEEE, (2011)Deep Feature-Review Transmit Network of Contour-Enhanced Road Extraction From Remote Sensing Images., , , , and . IEEE Geosci. Remote. Sens. Lett., (2022)Network pharmacology reveals the multiple mechanisms of Xiaochaihu decoction in the treatment of non-alcoholic fatty liver disease., , , , , , , , , and . BioData Min., 13 (1): 11 (2020)A Survey of Networking Applications Applying the Software Defined Networking Concept Based on Machine Learning., , , , , and . IEEE Access, (2019)A Q-learning method based on coarse-to-fine potential energy surface for locating transition state and reaction pathway., , , , , , and . J. Comput. Chem., 45 (8): 487-497 (March 2024)An Automatic Moving Object Detection Algorithm for Video Surveillance Applications., , , and . ICESS, page 541-543. IEEE Computer Society, (2009)