Author of the publication

RST-RF: A Hybrid Model based on Rough Set Theory and Random Forest for Network Intrusion Detection.

, , , , and . ICCSP, page 77-81. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CIDetector: Semi-Supervised Method for Multi-Topic Confidential Information Detection., , , , , , and . ECAI, volume 325 of Frontiers in Artificial Intelligence and Applications, page 1834-1841. IOS Press, (2020)Energy Efficient Data Transmission Mechanism in Wireless Sensor Networks., , , , and . ISCSCT (1), page 216-219. IEEE Computer Society, (2008)A Visualization Scheme for Network Forensics Based on Attribute Oriented Induction Based Frequent Item Mining and Hyper Graph., , , , , and . ICDF2C, volume 216 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 130-143. Springer, (2017)Warder: Online Insider Threat Detection System Using Multi-Feature Modeling and Graph-Based Correlation., , , , , , , and . MILCOM, page 1-6. IEEE, (2019)HeterSupervise: Package-level Android Malware Analysis Based on Heterogeneous Graph., , , , , , and . HPCC/DSS/SmartCity, page 328-335. IEEE, (2020)NFDD: A Dynamic Malicious Document Detection Method Without Manual Feature Dictionary., , , , , , and . WASA (2), volume 12938 of Lecture Notes in Computer Science, page 147-159. Springer, (2021)Are we really making much progress?: Revisiting, benchmarking and refining heterogeneous graph neural networks., , , , , , , , , and . KDD, page 1150-1160. ACM, (2021)Person Re-identification based on nonlinear ranking with difference vectors., , , , , and . Inf. Sci., (2014)An Improved Selective Encryption for H.264 Video based on Intra Prediction Mode Scrambling., , , , and . J. Multim., 5 (5): 464-472 (2010)Saliency and Granularity: Discovering Temporal Coherence for Video-Based Person Re-Identification., , , , , and . IEEE Trans. Circuits Syst. Video Technol., 32 (9): 6100-6112 (2022)