Author of the publication

A Mathematical Modeling of Exploitations and Mitigation Techniques Using Set Theory.

, , , and . IEEE Symposium on Security and Privacy Workshops, page 323-328. IEEE Computer Society, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A high-speed 3-D image measurement method., and . Artif. Life Robotics, 16 (4): 526-528 (2012)A Novel Hybrid Attention-Driven Multistream Hierarchical Graph Embedding Network for Remote Sensing Object Detection., , , , , , , , , and . Remote. Sens., 14 (19): 4951 (2022)Image haze removal based on rolling deep learning and Retinex theory., , , , and . IET Image Process., 16 (2): 485-498 (2022)Prediction of EV Charging Load Using Two-Stage Time Series Decomposition and DeepBiLSTM Model., , , , , , , and . IEEE Access, (2023)COVID-19 datasets: A brief overview., , , , and . Comput. Sci. Inf. Syst., 19 (3): 1115-1132 (2022)Optimal pricing and capacity sizing for online service systems with free trials., and . OR Spectr., 44 (1): 57-86 (2022)Pre-Training Across Different Cities for Next POI Recommendation., , , , , , , and . ACM Trans. Web, 17 (4): 31:1-31:27 (November 2023)A Mathematical Modeling of Exploitations and Mitigation Techniques Using Set Theory., , , and . IEEE Symposium on Security and Privacy Workshops, page 323-328. IEEE Computer Society, (2018)Micro-innovative Design of Internet Products from the Perspective of User Stickiness - Illustrated by the Case of 360 Applets., and . HCI (38), volume 1224 of Communications in Computer and Information Science, page 94-99. Springer, (2020)A Practical Chinese Dependency Parser Based on A Large-scale Dataset., , , and . CoRR, (2020)