Author of the publication

BJUT at TREC 2013 Microblog Track.

, , , , and . TREC, volume 500-302 of NIST Special Publication, National Institute of Standards and Technology (NIST), (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Industrial Anomaly Detection and Attack Classification Method Based on Convolutional Neural Network., , and . Secur. Commun. Networks, (2019)MDFD: A multi-source data fusion detection framework for Sybil attack detection in VANETs., , , , and . Comput. Networks, (April 2023)FITIC: A Few-shot Learning Based IoT Traffic Classification Method., , , , and . ICCCN, page 1-10. IEEE, (2022)Unknown Malicious Executable Defection.. ISDA (2), page 202-207. IEEE Computer Society, (2008)Trusted Computing Based Mobile DRM Authentication Scheme., , and . IAS, page 7-10. IEEE Computer Society, (2009)Zen-tor: A Zero Knowledge Known-Unknown Traffic Classification Method., , and . GLOBECOM, page 885-890. IEEE, (2022)Intrusion Detection of Industrial Control System Based on Modbus TCP Protocol., , , , , , and . ISADS, page 156-162. IEEE Computer Society, (2017)BJUT at TREC 2014 Contextual Suggestion Track: Hybrid Recommendation Based on Open-web Information., , , , and . TREC, volume 500-308 of NIST Special Publication, National Institute of Standards and Technology (NIST), (2014)Study and Implementation of Trust Evaluation Access Control Mechanism Based on XEN., , and . HPCC-ICESS, page 1276-1281. IEEE Computer Society, (2012)Unknown Malicious Identification., and . World Congress on Engineering (Selected Papers), volume 39 of Lecture Notes in Electrical Engineering, page 301-312. Springer, (2008)