Author of the publication

Calculation of Network Security Index Based on Convolution Neural Networks.

, , , , , and . ICAIS (3), volume 11634 of Lecture Notes in Computer Science, page 530-540. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Malicious mining code detection based on ensemble learning in cloud computing environment., , , , , and . Simul. Model. Pract. Theory, (2021)A Novel Malware Detection Framework Based on Weighted Heterograph., , , , , and . CIAT, page 39-43. ACM, (2020)Coevolution of multi-game resolves social dilemma in network population., , , , and . Appl. Math. Comput., (2019)A Hybrid Model for Experts Finding in Community Question Answering., , and . CyberC, page 176-185. IEEE Computer Society, (2015)An efficient dynamic ID based remote user authentication scheme using self-certified public keys for multi-server environment, , , and . CoRR, (2013)A Structure-Based De-Anonymization Attack on Graph Data Using Weighted Neighbor Match., , , , and . DSC, page 480-486. IEEE, (2019)Structural Vulnerability of Power Grid Under Malicious Node-Based Attacks., , , , , and . DependSys, volume 1123 of Communications in Computer and Information Science, page 446-453. Springer, (2019)Building framework for selecting finite element models of complex large welded structure of railway vehicles., , , , , and . Simul. Model. Pract. Theory, (2019)Comparison of Muscle Activity and Ultrasound Response of Lower Extremity Muscles During Treadmill and Track Running., , , and . J. Medical Imaging Health Informatics, 11 (8): 2091-2096 (2021)A Review of Provenance Graph based APT Attack Detection: Applications and Developments., , , , , and . DSC, page 498-505. IEEE, (2022)