Author of the publication

MetaIoT: Few Shot Malicious Traffic Detection in Internet of Things Networks Based on HIN.

, , , , and . IFIP Networking, page 1-9. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SVDinsTN: An Integrated Method for Tensor Network Representation with Efficient Structure Search., , , , , , and . CoRR, (2023)A Time-Space Attribute-Based Evidence Fixing Method in Digital Forensics., , and . TSA, page 127-131. IEEE, (2016)A complexity measure for military communication networks., , , , and . MILCOM, page 1708-1713. IEEE, (2011)Maintenance Organization Value Chain Analysis and Its Formalization., , and . ICAIC (3), volume 226 of Communications in Computer and Information Science, page 289-296. Springer, (2011)Coverage probability of the downlink in heterogeneous cellular networks considering the effect of user clustering around spatially depended social attractors., , and . CAMAD, page 48-52. IEEE, (2016)Optimal error of query sets under the differentially-private matrix mechanism., and . ICDT, page 272-283. ACM, (2013)Optimizing linear counting queries under differential privacy., , , , and . PODS, page 123-134. ACM, (2010)Efficient Batch Query Answering Under Differential Privacy, and . CoRR, (2011)A Data- and Workload-Aware Algorithm for Range Queries Under Differential Privacy., , , and . CoRR, (2014)Investigation on Key Techniques of Measurement Device of Position and Attitude Applied in Large-Scale Pushing Bridge Construction Machinery., , , and . RAM, page 697-701. IEEE, (2008)