Author of the publication

Diverse Intrusion and Malware Detection: AI-Based and Non-AI-Based Solutions.

, and . J. Cybersecur. Priv., 4 (2): 382-387 (June 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Investigating users' eye movement behavior in critiquing-based recommender systems., , and . AI Commun., 30 (3-4): 207-222 (2017)An Eye-Tracking Study: Implication to Implicit Critiquing Feedback Elicitation in Recommender Systems., and . UMAP, page 163-167. ACM, (2016)Mobile Instant Video Clip Sharing: Modeling and Enhancing View Experience., , and . CoRR, (2014)Multi-Observation Block Adjustment by Rational Function Model Without Ground Control Points., , and . IGARSS, page 6424-6427. IEEE, (2018)Analog Circuit Design Automation Using Neural Network-Based Two-Level Genetic Programming, and . 2006 International Conference on Machine Learning and Cybernetics, page 2087--2092. Dalian, IEEE, (August 2006)A novel character segmentation method for serial number on banknotes with complex background., , , , and . J. Ambient Intell. Humaniz. Comput., 10 (8): 2955-2969 (2019)Understand Instant Video Clip Sharing on Mobile Platforms: Twitter's Vine as a Case Study., , and . NOSSDAV, page 85. ACM, (2014)Recommendation for New Users with Partial Preferences by Integrating Product Reviews with Static Specifications., , and . UMAP, volume 7899 of Lecture Notes in Computer Science, page 281-288. Springer, (2013)Residual Learning of Deep Convolutional Neural Network for Seismic Random Noise Attenuation., and . IEEE Geosci. Remote. Sens. Lett., 16 (8): 1314-1318 (2019)Adapted Anisotropic Gaussian SIFT Matching Strategy for SAR Registration., , and . IEEE Geosci. Remote. Sens. Lett., 12 (1): 160-164 (2015)