Author of the publication

Detection of networks blocks used by the Storm Worm botnet.

, , and . ACM Southeast Regional Conference, page 356-360. ACM, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EEG Classification of Imaginary Lower Limb Stepping Movements Based on Fuzzy Support Vector Machine with Kernel-Induced Membership Function., , , , and . Int. J. Fuzzy Syst., 19 (2): 566-579 (2017)CLEEGN: A Convolutional Neural Network for Plug-and-Play Automatic EEG Reconstruction., , , and . CoRR, (2022)How to Best Meet Consumers' Preferences for New Product Design: An Application of Art and Design., and . IV, page 610-612. IEEE Computer Society, (2012)Deep Neural Networks for New Product Form Design., , , , and . ICINCO (2), page 653-657. SciTePress, (2019)Intelligent Computing for Vehicle Form Design: A Case Study of Sand Making Machine., , , , and . IOV, volume 10689 of Lecture Notes in Computer Science, page 154-161. Springer, (2017)How will the use of graphics affect visual aesthetics? A user-centered approach for web page design., , and . Int. J. Hum. Comput. Stud., 71 (3): 217-227 (2013)Virtual and Augmented Reality to Historical Site Reconstruction: A Pilot Study of East Taiwan Old Railway Station., , , and . AIVR, page 42-46. ACM, (2018)A Usability Evaluation of Utilizing Retro Game Design for Upper Limb Rehabilitation in Older Adults., , , and . GCCE, page 1113-1117. IEEE, (2023)Unknown System Dynamic Estimator-Based Two-Phase Power Reaching Law Control for DC-DC Buck Converter., , , and . IEEE Trans. Circuits Syst. I Regul. Pap., 70 (11): 4641-4649 (November 2023)A2S2-GNN: Rigging GNN-Based Social Status by Adversarial Attacks in Signed Social Networks., , , , and . IEEE Trans. Inf. Forensics Secur., (2023)