Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constructing APT Attack Scenarios Based on Intrusion Kill Chain and Fuzzy Clustering., , , and . Secur. Commun. Networks, (2017)Defense Strategy of Network Security based on Dynamic Classification., , , , and . KSII Trans. Internet Inf. Syst., 9 (12): 5116-5134 (2015)An Android malware detection method based on AndroidManifest file., , , , and . CCIS, page 239-243. IEEE, (2016)Phishing sites detection based on Url Correlation., , , , , and . CCIS, page 244-248. IEEE, (2016)An attack pattern mining algorithm based on fuzzy logic and sequence pattern., , , , , and . CCIS, page 234-238. IEEE, (2016)Attack pattern mining algorithm based on security log., , , , and . ISI, page 205. IEEE, (2017)T-GRU: conTextual Gated Recurrent Unit model for high quality Linguistic Steganography., , , and . WIFS, page 1-6. IEEE, (2022)A Robust Deepfake Video Detection Method based on Continuous Frame Face-swapping., , , and . AIIPCC, page 188-191. IEEE, (2022)Sense-aware BERT and Multi-task Fine-tuning for Multimodal Sentiment Analysis., , and . IJCNN, page 1-8. IEEE, (2022)Flat suppercontinuum generation in the inner cladding fiber with InP nano thin film., , , and . NEMS, page 996-999. IEEE Computer Society, (2009)