From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Design of Immersion Acrophobia Adjuvant Therapy System (IAATS)., , , и . IFTC, том 1009 из Communications in Computer and Information Science, стр. 447-455. Springer, (2018)An Intrusion Detection Method for Cyber Monintoring Using Attention based Hierarchical LSTM., , , и . BigDataSecurity/HPSC/IDS, стр. 125-130. IEEE, (2022)Chinese Morphological Analysis Using Morpheme and Character Features., , , , и . PRICAI, том 7458 из Lecture Notes in Computer Science, стр. 866-869. Springer, (2012)Design of Online Annotation and Incision System for IVUS Images., , , , и . IFTC, том 1009 из Communications in Computer and Information Science, стр. 74-90. Springer, (2018)A Densely Stacked Attention Method for Cyberattack Detection., , , и . J. Inf. Sci. Eng., 39 (4): 935-950 (2023)Intrusion Detection Based on Fusing Deep Neural Networks and Transfer Learning., , , , , , , и . IFTC, том 1181 из Communications in Computer and Information Science, стр. 212-223. Springer, (2019)Machine Learning and Deep Learning Methods for Cybersecurity., , , , , , , , и . IEEE Access, (2018)Auditing Between Event Logs and Process Trees., , , и . IFTC, том 1009 из Communications in Computer and Information Science, стр. 227-237. Springer, (2018)