Author of the publication

Dynamic Adjusting ABC-SVM Anomaly Detection Based on Weighted Function Code Correlation.

, , , , , and . ML4CS (1), volume 12486 of Lecture Notes in Computer Science, page 1-11. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimized Interpolation for Volume Ray Casting., , and . J. Graphics, GPU, & Game Tools, 4 (1): 11-24 (1999)Interactive Stereoscopic Rendering of Volumetric Environments., , , and . IEEE Trans. Vis. Comput. Graph., 10 (1): 15-28 (2004)A Blockchain-Based IoT Workflow Management Approach., , , , , and . ICBDS, volume 1210 of Communications in Computer and Information Science, page 633-644. Springer, (2019)Accelerating Voxel-Based Terrain Rendering with Keyframe-Free Image-Based Rendering., , , and . VG, page 301-313. Eurographics Association, (2001)DitDetector: Bimodal Learning based on Deceptive Image and Text for Macro Malware Detection., , , , , and . ACSAC, page 227-239. ACM, (2022)Industrial communication intrusion detection algorithm based on improved one-class SVM., , , and . WCICSS, page 21-25. IEEE, (2015)Double-Optimized CS-BP Anomaly Prediction for Control Operation Data., , and . ADMA (1), volume 14176 of Lecture Notes in Computer Science, page 509-523. Springer, (2023)Label Noise Detection Based on Tri-training., , and . ICCCS (1), volume 11063 of Lecture Notes in Computer Science, page 613-622. Springer, (2018)A fast information reproduction method for HTTP in WLAN., , , and . WCNIS, page 365-369. IEEE, (2010)Modbus Communication Behavior Modeling and SVM Intrusion Detection Method., , , , and . ICCNS, page 80-85. ACM, (2016)