Author of the publication

Robust Anomaly-Based Insider Threat Detection Using Graph Neural Network.

, , , , , and . IEEE Trans. Netw. Serv. Manag., 20 (3): 3717-3733 (September 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LeakDoctor: Toward Automatically Diagnosing Privacy Leaks in Mobile Applications., , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 3 (1): 28:1-28:25 (2019)The study about flow velocity measurement with spatial filter principle based on the electrostatic sensor., , , and . EMEIT, page 2865-2868. IEEE, (2011)Image-Based Insider Threat Detection via Geometric Transformation., , , , , and . Secur. Commun. Networks, (2021)A UAV Cluster Goods Delivery Task Assignment Method Based on Graph Matching and Reinforcement Learning., , , , and . JCRAI, page 184-192. ACM, (2023)Supporting quality of service in energy harvesting wireless links: The effective capacity analysis., , , , and . ICC Workshops, page 901-906. IEEE, (2014)Web service sub-chain recommendation leveraging graph searching., , , and . ComComAP, page 271-275. IEEE, (2014)How to Develop Service Climate in G2B E-Service Industry: a Multi-method Study., , and . PACIS, page 351. (2016)Design and implementation of homogeneous multi-core system., , , and . ASICON, page 788-791. IEEE, (2017)Solutions for One-Dimensional Time-Dependent Schrödinger Equations., , and . ICICA (2), volume 308 of Communications in Computer and Information Science, page 371-378. Springer, (2012)Star Receiver in MIMO-CDMA Multipath Channels., and . ICASSP (3), page 229-232. IEEE, (2007)