Author of the publication

Robust Network Intrusion Detection Scheme Using Long-Short Term Memory Based Convolutional Neural Networks.

, , , , and . Mob. Networks Appl., 26 (3): 1137-1144 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mining dense overlapping subgraphs in weighted protein-protein interaction networks, , and . Biosystems, (Nov 21, 2010)Applying Larger N-Tuple Networks to EinStein Wurfelt Nicht!, , , and . CIIS, page 165-172. ACM, (2023)Flexible Heterogeneous Multicore Architectures for Media Processing via Customized Long Instruction Words., and . VLSI-SOC, page 270-275. Technische Universität Darmstadt, Insitute of Microelectronic Systems, (2003)High-Level Synthesis for Self-Timed Systems., , , and . APCCAS, page 1410-1413. IEEE, (2006)A Study on the Online VS Traditional Classroom Teaching Styles in Sino-Foreign Cooperative Institutions at Times of COVID 19., and . DMI, volume 367 of Frontiers in Artificial Intelligence and Applications, page 258-264. IOS Press, (2022)Discovering Alias for Chemical Material with NGD., , , , and . ICSI (2), volume 9713 of Lecture Notes in Computer Science, page 123-131. Springer, (2016)InteractDiff: A 3D Sandbox Game for Online Teaching and Campus Life Experience., , , , , and . INTERACT (5), volume 12936 of Lecture Notes in Computer Science, page 442-446. Springer, (2021)Robust Network Intrusion Detection Scheme Using Long-Short Term Memory Based Convolutional Neural Networks., , , , and . Mob. Networks Appl., 26 (3): 1137-1144 (2021)User Satisfaction-Based Scheduling Algorithm for Uplink Transmission in Long Term Evolution System., , , , and . ICPADS, page 930-935. IEEE Computer Society, (2012)Using Long-Short-Term Memory Based Convolutional Neural Networks for Network Intrusion Detection., , , , and . WICON, volume 264 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 86-94. Springer, (2018)