Author of the publication

An Attack Entity Deducing Model for Attack Forensics.

, , , , , and . ICONIP (15), volume 1969 of Communications in Computer and Information Science, page 340-354. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Double-Branch Local Context Feature Extraction Network for Hyperspectral Image Classification., , , , and . IEEE Geosci. Remote. Sens. Lett., (2022)Towards Inductive Robustness: Distilling and Fostering Wave-induced Resonance in Transductive GCNs Against Graph Adversarial Attacks., , , , , and . CoRR, (2023)Artificial immunity based distributed and fast anomaly detection for Industrial Internet of Things., , , , , and . Future Gener. Comput. Syst., (November 2023)Comprehensive Android Malware Detection Based on Federated Learning Architecture., , , , , , , and . IEEE Trans. Inf. Forensics Secur., (2023)Construction of Agent Model Based on Emotional Interaction., , , and . ISEEIE, page 356-360. ACM, (2021)MPF-FS: A multi-population framework based on multi-objective optimization algorithms for feature selection., , , , , and . Appl. Intell., 53 (19): 22179-22199 (October 2023)Miniaturized Photo-Ionization Fourier Deconvolution Ion Mobility Spectrometer for the Detection of Volatile Organic Compounds., , , , , and . Sensors, 22 (15): 5468 (2022)Graph Agent Network: Empowering Nodes with Decentralized Communications Capabilities for Adversarial Resilience., , , , , , and . CoRR, (2023)A Hierarchical Unmanned Aerial Vehicle Network Intrusion Detection and Response Approach Based on Immune Vaccine Distribution., , , , , , and . IEEE Internet Things J., 11 (20): 33312-33325 (October 2024)Towards Inductive Robustness: Distilling and Fostering Wave-Induced Resonance in Transductive GCNs against Graph Adversarial Attacks., , , , , and . AAAI, page 13855-13863. AAAI Press, (2024)