Author of the publication

Network attack detection method for power system terminal based on improved random forest.

, , , , , and . ICAIIS, page 85:1-85:6. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Neural Network Based Landscape Pattern Simulation in ChangBai Mountain, Northeast China., , , , and . ISNN (2), volume 5552 of Lecture Notes in Computer Science, page 911-920. Springer, (2009)Solution of Brain Contradiction by Extension Theory., and . IFIP TC12 ICIS, volume 539 of IFIP Advances in Information and Communication Technology, page 24-29. Springer, (2018)Rumor Detection Based on Depth and Breadth with Tree-Structured Recursive Neural Networks., , , , , , , and . IJCNN, page 1-8. IEEE, (2023)Research on fake news detection method based on multi-level semantic enhancement., , , , , and . IJCNN, page 1-8. IEEE, (2023)Application of Zero Trust Security Architecture in Power Communication Network Security Management System., , , , and . SPCNC, page 397-401. ACM, (2023)Component Content Soft-Sensor Based on Adaptive Fuzzy System in Rare-Earth Countercurrent Extraction Process., , , and . FSKD (2), volume 3614 of Lecture Notes in Computer Science, page 891-896. Springer, (2005)Research on RFID security protocol based on grouped tags and re-encryption scheme., , , and . WCNIS, page 568-572. IEEE, (2010)Application of extension innovation method in assembly production process optimization., , and . ITQM, volume 214 of Procedia Computer Science, page 412-419. Elsevier, (2022)Extension Innovation Design of Product Family Based on Kano Requirement Model., , and . ITQM, volume 55 of Procedia Computer Science, page 268-277. Elsevier, (2015)A Greedy Algorithm for Detecting Mutually Exclusive Patterns in Cancer Mutation Data., , , , , , and . IWBBIO (1), volume 11465 of Lecture Notes in Computer Science, page 154-165. Springer, (2019)