Author of the publication

Modeling and clustering attacker activities in IoT through machine learning techniques.

, , , , and . Inf. Sci., (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Osprey: A fast and accurate patch presence test framework for binaries., , , and . Comput. Commun., (2021)Optimal Inter-area Oscillation Damping Control: A Transfer Deep Reinforcement Learning Approach with Switching Control Strategy., , , and . CoRR, (2023)Research on the application of Medical-meteorological forecast model of infectious diarrhea disease in Beijing., , , , , and . BIC-TA, page 100-103. IEEE, (2010)Tree decomposition based anomalous connected subgraph scanning for detecting and forecasting events in attributed social media networks., , , , and . Neurocomputing, (2020)Hyperbolic Multiplex Network Embedding with Maps of Random Walk.. CoRR, (2019)Optimization of Electrostatic Force System Based on Newton Interpolation Method., , , and . J. Sensors, (2018)Modeling and clustering attacker activities in IoT through machine learning techniques., , , , and . Inf. Sci., (2019)An OpenCL Approach of Prestack Kirchhoff Time Migration Algorithm on General Purpose GPU., and . PDCAT, page 179-183. IEEE, (2012)The Differential Method for Force Measurement Based on Electrostatic Force., , , , , and . J. Sensors, (2017)Inferring Multiplex Diffusion Network via Multivariate Marked Hawkes Process., , , , and . CoRR, (2018)