Author of the publication

Content-Aware Anomaly Detection with Network Representation Learning.

, , , and . ICA3PP (3), volume 12454 of Lecture Notes in Computer Science, page 50-64. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Resource Allocation for D2D Video Multicast Using Multi-Leader Multi-Follower Stackelberg Game With Personalized Incentives., , , , , , and . IEEE Access, (2019)Who is in Control? Practical Physical Layer Attack and Defense for mmWave based Sensing in Autonomous Vehicles., , , , , and . CoRR, (2020)Applications of Novel Hybrid Bat Algorithm With Constrained Pareto Fuzzy Dominant Rule on Multi-Objective Optimal Power Flow Problems., , , and . IEEE Access, (2019)Underwater cooperative MIMO communications using hybrid acoustic and magnetic induction technique., , , , , and . Comput. Networks, (2020)Bi-Parameters Method For Structural Vulnerability Analysis., , and . Intell. Autom. Soft Comput., 16 (5): 747-754 (2010)The Mtb Proteome Library: A Resource of Assays to Quantify the Complete Proteome of Mycobacterium tuberculosis., , , , , , , , , and 5 other author(s). Cell host & microbe, 13 (5): 602--612 (May 15, 2013)Large Range Soil Moisture Sensing for Inhomogeneous Environments Using Magnetic Induction Networks., , , and . GLOBECOM, page 1-6. IEEE, (2019)STGRFT for Detection of Maneuvering Weak Target With Multiple Motion Models., , , , , , and . IEEE Trans. Signal Process., 67 (7): 1902-1917 (2019)A Novel Approach for Associating IP Addresses with Organizations using Deep Learning., , , and . CCEAI, page 173-177. ACM, (2023)STIX-based Network Security Knowledge Graph Ontology Modeling Method., , , , , , and . ICGDA, page 152-157. ACM, (2020)