Author of the publication

AI-enabled Multi-modal Network Anomaly Association: A Deep Self/Semi-Supervised Learning Approach.

, , , , , , and . ICC, page 4068-4073. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Segmentation of dermoscopy images based on fully convolutional neural network., , , , and . ICIP, page 1732-1736. IEEE, (2017)Network coding based multipath TCP., , and . INFOCOM Workshops, page 25-30. IEEE, (2012)S-Chord: Hybrid Topology Makes Chord Efficient., , , and . ICN (2), volume 3421 of Lecture Notes in Computer Science, page 480-487. Springer, (2005)QuickSync: Improving Synchronization Efficiency for Mobile Cloud Storage Services., , , , and . MobiCom, page 592-603. ACM, (2015)Robust and Adaptive Scheduling of Sequential Periodic Sensing for Cognitive Radios., , and . IEEE J. Sel. Areas Commun., 32 (3): 503-515 (2014)Dynamic Multiple-Threshold Call Admission Control Based on Optimized Genetic Algorithm in Wireless/Mobile Networks., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 91-A (7): 1597-1608 (2008)Low-Latency Networking: Architecture, Techniques, and Opportunities., , , , and . IEEE Internet Comput., 22 (5): 56-63 (2018)State management in IPv4 to IPv6 transition., , , , , and . IEEE Netw., 29 (6): 48-53 (2015)Tunnel-Based IPv6 Transition., , , , , , and . IEEE Internet Comput., 17 (2): 62-68 (2013)Enabling Ciphertext Deduplication for Secure Cloud Storage and Access Control., , , , , and . AsiaCCS, page 59-70. ACM, (2016)