Author of the publication

Intrusion Detection Algorithm Based on SDA-ELM.

, , , , and . IEA/AIE (2), volume 12799 of Lecture Notes in Computer Science, page 495-505. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The application value of support vector machine model based on multimodal MRI in predicting IDH-1mutation and Ki-67 expression in glioma., , , , , , , and . BMC Medical Imaging, 24 (1): 244 (December 2024)Intrusion Detection Algorithm Based on SDA-ELM., , , , and . IEA/AIE (2), volume 12799 of Lecture Notes in Computer Science, page 495-505. Springer, (2021)Regenerator pool site selection for mixed line rate optical networks., , , , , , and . ICC, page 3084-3088. IEEE, (2012)Security Optimization of Wireless Sensor Networks Based on Cloud Platform., and . Int. J. Online Eng., 14 (2): 48-59 (2018)Time Series Data Cleaning: A Survey., and . CoRR, (2020)A Burst-Switched Photonic Network Testbed: Its Architecture, Protocols and Experiments., , , , , and . IEICE Trans. Commun., 88-B (10): 3864-3873 (2005)Musical Notes Estimation Based on Greatest Common Devisor and Likelihood., and . ICBDC, page 86-89. ACM, (2018)Joint Update Rate Adaptation in Multiplayer Cloud-Edge Gaming Services: Spatial Geometry and Performance Tradeoffs., , , , and . MobiHoc, page 191-200. ACM, (2021)"Good" and "Bad" Machine Agency in the Context of Human-AI Communication: The Case of ChatGPT., , , and . HCI (53), volume 14059 of Lecture Notes in Computer Science, page 3-23. Springer, (2023)Expressions of Data: Natural State, Specific Application, and General Pattern., , and . HCI (18), volume 12779 of Lecture Notes in Computer Science, page 401-412. Springer, (2021)