Author of the publication

Information Security Risk Analysis of Intelligent Terminals in Electricity Information Collection System.

, , , , , , and . ACM TUR-C, page 98-103. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Label Propagation Based Semi-supervised Feature Selection to Decode Clinical Phenotype of Huntington's Disease., , , , and . ICIC (1), volume 11643 of Lecture Notes in Computer Science, page 529-542. Springer, (2019)A Generative Adversarial Network Model for Disease Gene Prediction With RNA-seq Data., , , , and . IEEE Access, (2020)Flexible Non-Negative Matrix Factorization to Unravel Disease-Related Genes., , , and . IEEE ACM Trans. Comput. Biol. Bioinform., 16 (6): 1948-1957 (2019)Identify Huntington's disease associated genes based on restricted Boltzmann machine with RNA-seq data., , , and . BMC Bioinform., 18 (1): 447:1-447:13 (2017)NeuroPpred-Fuse: an interpretable stacking model for prediction of neuropeptides by fusing sequence information and feature selection methods., , , , , , , , , and 2 other author(s). Briefings Bioinform., (2021)EEG-Based Brain-Computer Interfaces Are Vulnerable to Backdoor Attacks., , , , , , , , and . CoRR, (2020)GT-SimNet: Improving code automatic summarization via multi-modal similarity networks., , , , , and . J. Syst. Softw., (2022)Boundary-Aware Bias Loss for Transformer-Based Aerial Image Segmentation Model., , , , and . ICASSP, page 3528-3532. IEEE, (2022)HELoC: hierarchical contrastive learning of source code representation., , , , , , , and . ICPC, page 354-365. ACM, (2022)Tensor-Based Downlink Channel Reconstruction for FDD Massive MIMO., , , , and . ACSCC, page 1453-1458. IEEE, (2021)