Author of the publication

Immunity-Based Model for Malicious Code Detection.

, , , and . ICIC (1), volume 6215 of Lecture Notes in Computer Science, page 399-406. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Observation Reduction for Strong Plans., , , and . IJCAI, page 1930-1935. (2007)The full positive flows of Manakov hierarchy, Hamiltonian structures and conservation laws., , and . Appl. Math. Comput., (2013)An Adversarial Examples Identification Method for Time Series in Internet-of-Things System., , , , , and . IEEE Internet Things J., 8 (12): 9495-9510 (2021)A method of automatically generating initial parameters for large-scale belief rule base., , , , , and . Knowl. Based Syst., (2020)UAV Trajectory Design on Completion Time Minimization of WPT Task in UAV-Enabled Multi-User Network., , , , , and . ICC Workshops, page 1047-1052. IEEE, (2022)Fault Diagnosis Method of WSN Nodes Based on Wavelet Packet and Belief Rule Base., , , , and . CAA SAFEPROCESS, page 884-889. IEEE, (2019)Radar Emitter Signal Recognition Method Based on EEMD and Ambiguity Function Contour with EfficientNet., , and . AIAM, page 400-404. IEEE, (2022)Quasi-periodic Solutions of the Kaup-Kupershmidt Hierarchy., , and . J. Nonlinear Sci., 23 (4): 527-555 (2013)Optimization path for total factor carbon productivity in Beijing-Tianjin-Hebei., , , and . SMC, page 981-987. IEEE, (2019)Predicting the final prices of online auction items., , , and . Expert Syst. Appl., 31 (3): 542-550 (2006)