Author of the publication

A quantitative assessment method of network information security vulnerability detection risk based on the meta feature system of network security data.

, , , , and . KSII Trans. Internet Inf. Syst., 15 (12): 4531-4544 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RDA: An Accelerated Collision Free Motion Planner for Autonomous Navigation in Cluttered Environments., , , , , , , and . IEEE Robotics Autom. Lett., 8 (3): 1715-1722 (March 2023)Triple-discriminator GAN for semi-supervised generalized zero-shot learning., , and . Neurocomputing, (2022)RDA: An Accelerated Collision-free Motion Planner for Autonomous Navigation in Cluttered Environments., , , , , , , and . CoRR, (2022)CafkNet: GNN-Empowered Forward Kinematic Modeling for Cable-Driven Parallel Robots., , , , and . CoRR, (2024)Attention-Based Personalized Encoder-Decoder Model for Local Citation Recommendation., , , and . Comput. Intell. Neurosci., (2019)On the Security of a Latin-Bit Cube-Based Image Chaotic Encryption Algorithm., and . Entropy, 21 (9): 888 (2019)GOATS: Goal Sampling Adaptation for Scooping with Curriculum Reinforcement Learning., , , , , and . IROS, page 1023-1030. (2023)An Efficient Centralized Planner for Multiple Automated Guided Vehicles at the Crossroad of Polynomial Curves., , and . IEEE Robotics Autom. Lett., 7 (1): 398-405 (2022)A quantitative assessment method of network information security vulnerability detection risk based on the meta feature system of network security data., , , , and . KSII Trans. Internet Inf. Syst., 15 (12): 4531-4544 (2021)Ray-based Interference Free Workspace Analysis and Path Planning for Cable-Driven Robots.. CoRR, (2022)