Author of the publication

A Novel Framework Design of Network Intrusion Detection Based on Machine Learning Techniques.

, , , , , , and . Secur. Commun. Networks, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A reversible data hiding in encrypted image based on prediction-error estimation and location map., , , and . Multim. Tools Appl., 79 (17-18): 11591-11614 (2020)Attribute-Based Keyword Search with Proxy Re-Encryption in the Cloud., , , and . IEICE Trans. Commun., 101-B (8): 1798-1808 (2018)Intra-Frame Error Concealment Scheme Using 3D Reversible Data Hiding in Mobile Cloud Environment., , , and . IEEE Access, (2018)Unmanned Aircraft System Applications in Damage Detection and Service Life Prediction for Bridges: A Review., , , , and . Remote. Sens., 14 (17): 4210 (2022)A fast algorithm for the electromagnetic scattering from a large rectangular cavity in three dimensions., , , and . CoRR, (2020)A weak Galerkin finite element method for Burgers' equation., and . J. Comput. Appl. Math., (2019)Taylor Kriging Metamodeling for Stochastic Simulation Interpolation., and . Int. J. Oper. Res. Inf. Syst., 2 (1): 82-95 (2011)无线传感器网络多应用场景下的安全数据融合方案 (Secure Data Aggregation Scheme for Multiple Applications in Wireless Sensor Networks)., , , and . 计算机科学, 44 (9): 162-167 (2017)The MSXF TTS System for ICASSP 2022 ADD Challenge., , , , and . CoRR, (2022)Robust Video Watermarking Using Normalized Zernike Moments., , , , and . ICAIS (3), volume 13340 of Lecture Notes in Computer Science, page 323-336. Springer, (2022)