Author of the publication

Malicious Domain Name Detection Based on Extreme Machine Learning.

, , and . Neural Process. Lett., 48 (3): 1347-1357 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A JPSO algorithm for SML estimation of DOA., , , , , and . ISCIT, page 457-460. IEEE, (2016)Distributed big data storage in optical wireless networks., , and . Big Data over Networks, Cambridge University Press, (2016)Instantly Decodable Network Coding Schemes for In-Order Progressive Retransmission., , , and . IEEE Communications Letters, 17 (6): 1069-1072 (2013)On Finite Block-Length Quantization Distortion., and . CoRR, (2013)On the applicability of software defined networking to large scale networks., , , , and . ICCCN, page 1-6. IEEE, (2014)Statistical Non-linear Model, Achievable Rates and Signal Detection for Photon-level Photomultiplier Receiver., , and . CoRR, (2018)Stringently Delay-Constrained Group Decoding and Adaptive Transmission for Multi-User Interference Channel., , , , and . IEEE Trans. Vehicular Technology, 68 (12): 11955-11970 (2019)Visible light communication based on wavelet packet division multiplexing., , and . WCSP, page 1-5. IEEE, (2014)Correlation Analysis and Link Gain Prediction for Optical Wireless Scattering Communication Over Broad Spectra., , and . IEEE Trans. Wirel. Commun., 19 (2): 1386-1396 (2020)Adaptive Transmission for Delay-Constrained Wireless Video., and . IEEE Trans. Wirel. Commun., 13 (1): 49-61 (2014)