Author of the publication

Web attack forensics based on network traffic behavior characteristics and URLs.

, , , and . AVSS, page 1-6. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Position Identification by Actively Localizing Spacial Sound Beacons., , and . IEICE Trans. Inf. Syst., 94-D (3): 632-638 (2011)基于行为特征分析的微博恶意用户识别 (Microblogging Malicious User Identification Based on Behavior Characteristic Analysis)., , and . 计算机科学, 45 (12): 111-116 (2018)Spatial Localization of Concurrent Multiple Sound Sources Using Phase Candidate Histogram., , , and . J. Adv. Comput. Intell. Intell. Informatics, 15 (9): 1277-1286 (2011)Distributed system anomaly detection using deep learning-based log analysis., , , and . Comput. Intell., 39 (3): 433-455 (June 2023)Haze Forecasting via Deep LSTM., , , , , and . APWeb/WAIM (1), volume 10987 of Lecture Notes in Computer Science, page 349-356. Springer, (2018)Fine-grained emoji sentiment analysis based on attributes of Twitter users., , , and . SmartCloud, page 134-139. IEEE, (2020)Recommendation of More Interests Based on Collaborative Filtering., , , , , , and . AINA, page 191-198. IEEE Computer Society, (2012)Triplet Embedding Convolutional Recurrent Neural Network for Long Text Semantic Analysis., , , , and . WISE, volume 13724 of Lecture Notes in Computer Science, page 607-615. Springer, (2022)A multivariate intersection over union of SiamRPN network for visual tracking., , , and . Vis. Comput., 38 (8): 2739-2750 (2022)Conversation Intention Perception Based on Knowledge Base., , and . PAKDD Workshops, volume 8643 of Lecture Notes in Computer Science, page 3-14. Springer, (2014)