Author of the publication

CTP: Defending Against Data Poisoning in Attack Traffic Detection Based Deep Neural Networks.

, , , , , and . IC-NIDC, page 414-420. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparison of electron transporting layer in white OLED with a double emissive layer structure., , , and . Displays, 33 (4-5): 191-194 (2012)Ag dendrite formed on the Cu pyramids as SERS substrate., , and . ASICON, page 1-3. IEEE, (2013)Simulation run allocation for optimization of order-up-to level configuration in a complex logistics., , , and . BIC-TA, page 46-50. IEEE, (2010)High stability double-pass backward Er-doped superfluorescent fiber source incorporating an Er-doped fiber filter., , , , and . MFI, page 1-4. IEEE, (2014)A bilinear transform approach for vocal tract length normalization., , and . ICARCV, page 547-551. IEEE, (2004)Poster: a framework for instant mobile web browsing with smart prefetching and caching., , , , and . MobiCom, page 367-370. ACM, (2014)Fast Focal Point Correction in Prism-Coupled Total Internal Reflection Scanning Imager Using an Electronically Tunable Lens., , , , , , , , and . Sensors, 18 (2): 524 (2018)UAG: User Action Graph Based on System Logs for Insider Threat Detection., , , , and . ISCC, page 1027-1032. IEEE, (2023)Document-Level Relation Extraction with Reconstruction., , and . AAAI, page 14167-14175. AAAI Press, (2021)Seeing Beyond Expert Blind Spots: Online Learning Design for Scale and Quality., , and . CHI, page 51:1-51:14. ACM, (2021)