Author of the publication

Applying big data based deep learning system to intrusion detection.

, , and . Big Data Min. Anal., 3 (3): 181-195 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formation of network coding coalitions for cooperative communications., and . IET Networks, 3 (2): 97-109 (2014)Lagrangian relaxation based pin assignment and Through-Silicon Via planning for 3-D SoCs., , , and . ASICON, page 1-4. IEEE, (2013)Hierarchical Clustering Support Vector Machines for Classifying Type-2 Diabetes Patients., , , , and . ISBRA, volume 4983 of Lecture Notes in Computer Science, page 379-389. Springer, (2008)Approaching Shannon performance by iterative decoding of linear codes with low-density generator matrix., and . IEEE Communications Letters, 7 (6): 266-268 (2003)Hybrid Path Selection Modeling by Considering Habits and Traffic Conditions., , , and . IEEE Access, (2019)Modeling Sanction Choices on Fraudulent Benefit Exchanges in Public Service Delivery., , and . J. Artificial Societies and Social Simulation, (2013)Combining data fusion with joint source-channel coding of correlated sensors., and . ITW, page 315-317. IEEE, (2004)Application-Specific Network-on-Chip synthesis with topology-aware floorplanning., , , and . SBCCI, page 1-6. IEEE, (2012)Energy-efficient secrecy precoding for general MIMOME wiretap channels., , , and . WCSP, page 1-5. IEEE, (2015)Transmission of correlated senders over a Rayleigh fading multiple access channel., , and . Signal Process., 86 (11): 3150-3159 (2006)