Author of the publication

Malicious URLs Detection Based on a Novel Optimization Algorithm.

, , , , and . IEICE Trans. Inf. Syst., 104-D (4): 513-516 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dark Matter Results from First 98.7 Days of Data from the PandaX-II Experiment, , , , , , , , , and 44 other author(s). Phys. Rev. Lett., 117 (12): 121303 (September 2016)Emulation of Dynamic Secondary Cooling and Soft Reduction in Continuous Slab Casting., , and . ICAIC (1), volume 224 of Communications in Computer and Information Science, page 356-364. Springer, (2011)Ephrin receptor A2 is an epithelial cell receptor for Epstein–Barr virus entry, , , , , , , , , and 11 other author(s). Nature Microbiology, 3 (2): 164--171 (2018)Bilateral control of teleoperation manipulator based on virtual force aware guidance., , , , , and . CIS/RAM, page 231-236. IEEE, (2017)Maximum Vertical Penetration of Plane Turbulent Negatively Buoyant Jets, and . J. Engrg. Math., 123 (10): 973--977 (1997)Dipolar \Assisted\ \Assignment\ \Protocol\ (\DAAP\) for \MAS\ solid-state \NMR\ of rotationally aligned membrane proteins in phospholipid bilayers, , and . J. Magn. Reson., (May 2014)Foundational-circuit-based spice simulation., , , and . ISCAS, page 876-879. IEEE, (2008)WAP Access Methods on Mobile Phones., and . HCI (2), volume 4551 of Lecture Notes in Computer Science, page 320-325. Springer, (2007)Embedded Ethernet Control Systems and Smart Node Design Method., and . ICNSC, page 42-46. IEEE, (2007)Cryptanalysis and improvement of a certificateless aggregate signature scheme., , , , and . Inf. Sci., (2015)