Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing Network Processor Simulation Speed with Statistical Input Sampling., , , , and . HiPEAC, volume 3793 of Lecture Notes in Computer Science, page 68-83. Springer, (2005)Estimating a graphical intra-class correlation coefficient (GICC) using multivariate probit-linear mixed models., , , , and . Comput. Stat. Data Anal., (2015)Fast-Flux Malicious Domain Name Detection Method Based on Domain Resolution Spatial Features., , and . ICISSP, page 240-251. SciTePress, (2023)Interpretable deep learning method for attack detection based on spatial domain attention., , , and . ISCC, page 1-6. IEEE, (2021)Analysis and design of narrowband active noise control systems., , , and . ICASSP, page 3557-3560. IEEE, (1998)A 2020 perspective on "Service quality management of online car-hailing based on PCN in the sharing economy"., , , and . Electron. Commer. Res. Appl., (2020)AdaBoost-driven multi-parameter real-time warning of rock burst risk in coal mines., , , , and . Eng. Appl. Artif. Intell., (2023)SSL Malicious Traffic Detection Based On Multi-view Features., , , , , and . ICCNS, page 40-46. ACM, (2019)Fusang: Graph-inspired Robust and Accurate Object Recognition on Commodity mmWave Devices., , , , , , and . MobiSys, page 489-502. ACM, (2023)Android malware detection method based on graph attention networks and deep fusion of multimodal features., , , , and . Expert Syst. Appl., 237 (Part C): 121617 (March 2024)