Author of the publication

Modeling Attackers Based on Heterogenous Graph through Malicious HTTP Requests.

, , , , , and . CSCWD, page 391-396. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extracting Threat Intelligence Relations Using Distant Supervision and Neural Networks., , , , , and . IFIP Int. Conf. Digital Forensics, volume 612 of IFIP Advances in Information and Communication Technology, page 193-211. Springer, (2021)Research and development of 3D cooperation tool., , , and . IEEE Workshop on Multimedia Signal Processing, page 440-443. IEEE, (2002)Quality Coin for Software Quality Improvement., and . FTC (2), volume 560 of Lecture Notes in Networks and Systems, page 649-660. Springer, (2022)Tax Risk Prediction of Real Estate Based on Convolutional Neural Network., and . MMBD/MLIS, volume 341 of Frontiers in Artificial Intelligence and Applications, page 49-56. IOS Press, (2021)Spatial and Temporal Characteristics of Cloud to Ground Lightning in Guizhou Province., , , , , and . FSKD (5), page 660-664. IEEE Computer Society, (2008)978-0-7695-3305-6.Smart ULT Management for Ultra-Large-Scale Software. International Journal of Software Engineering & Applications (IJSEA), 13 (4): 15-22 (July 2022)Insulator Defect Recognition Based on Faster R-CNN., , , , , and . CITS, page 1-4. IEEE, (2020)Proving UNSAT in Zero Knowledge., , , , , and . CCS, page 2203-2217. ACM, (2022)Optimization of the Stack Structure of Electronic Paper Display Modules by Using the Taguchi Method., , , and . ICCE-TW, page 1-2. IEEE, (2021)Vision-based Toothbrush Quality Evaluation., , and . DSIT, page 1-6. IEEE, (2022)