Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Android malware detection method based on AndroidManifest file., , , , and . CCIS, page 239-243. IEEE, (2016)Phishing sites detection based on Url Correlation., , , , , and . CCIS, page 244-248. IEEE, (2016)An attack pattern mining algorithm based on fuzzy logic and sequence pattern., , , , , and . CCIS, page 234-238. IEEE, (2016)Constructing APT Attack Scenarios Based on Intrusion Kill Chain and Fuzzy Clustering., , , and . Secur. Commun. Networks, (2017)Attack pattern mining algorithm based on security log., , , , and . ISI, page 205. IEEE, (2017)Defense Strategy of Network Security based on Dynamic Classification., , , , and . KSII Trans. Internet Inf. Syst., 9 (12): 5116-5134 (2015)Sense-aware BERT and Multi-task Fine-tuning for Multimodal Sentiment Analysis., , and . IJCNN, page 1-8. IEEE, (2022)Flat suppercontinuum generation in the inner cladding fiber with InP nano thin film., , , and . NEMS, page 996-999. IEEE Computer Society, (2009)Analysis of Current Steganography Tools: Classifications & Features., , , and . IIH-MSP, page 384-387. IEEE Computer Society, (2006)A New Watermarking Protocol of Copyright Protection., , , and . IIH-MSP, page 83-88. IEEE Computer Society, (2006)