Author of the publication

Robust Anomaly-Based Insider Threat Detection Using Graph Neural Network.

, , , , , and . IEEE Trans. Netw. Serv. Manag., 20 (3): 3717-3733 (September 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Compact and Wireless Freehand 3D Ultrasound Real-time Spine Imaging System: A pilot study., , , and . EMBC, page 2105-2108. IEEE, (2020)Conformal prediction for hypersonic flight vehicle classification., , and . COPA, volume 179 of Proceedings of Machine Learning Research, page 118-206. PMLR, (2022)HySec-Flow: Privacy-Preserving Genomic Computing with SGX-based Big-Data Analytics Framework., , , , , , and . CLOUD, page 733-743. IEEE, (2021)CoLRIO: LiDAR-Ranging-Inertial Centralized State Estimation for Robotic Swarms., , , , , , , and . ICRA, page 3920-3926. IEEE, (2024)Disassembling Obfuscated Executables with LLM., , , , , , and . CoRR, (2024)Position information encoding FPN for small object detection in aerial images., , , , , , and . Neural Comput. Appl., 36 (26): 16023-16035 (September 2024)Research on Reasoning and Retrieval Methods Based on Mongolian Curriculum Areas of Semantic Web., , and . J. Softw., 9 (7): 1701-1706 (2014)Automatic Diagnosis of Carotid Atherosclerosis Using a Portable Freehand 3D Ultrasound Imaging System., , , , , , , , and . CoRR, (2023)A Verified Confidential Computing as a Service Framework for Privacy Preservation., , , , , and . USENIX Security Symposium, page 4733-4750. USENIX Association, (2023)A Lightweight End-to-end Network for Wearing Mask Recognition on Low-resolution Images., , and . MCSoC, page 38-44. IEEE, (2022)