Author of the publication

Multifeature Named Entity Recognition in Information Security Based on Adversarial Learning.

, , and . Secur. Commun. Networks, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparison of Rarefication Techniques for Foot Simulation Using Subject Specific Three-Dimensional Anthropometry Data., , and . HCI (16), volume 10286 of Lecture Notes in Computer Science, page 57-68. Springer, (2017)Topic hierarchy generation via linear discriminant projection., , and . SIGIR, page 421-422. ACM, (2003)An integrated framework on mining logs files for computing system management., , , and . KDD, page 776-781. ACM, (2005)Soft Fusion with Second-Order Uncertainty Based on Vague Set., and . ITITS (1), volume 454 of Advances in Intelligent Systems and Computing, page 139-145. (2015)In Situ Real-Time Study of the Dynamic Formation and Conversion Processes of Metal Halide Perovskite Films, , , , , , , , , and . Advanced Materials, (2018)Quota-constrained Job Submission Behavior at Commercial Supercomputer., , , , , and . ACA, volume 908 of Communications in Computer and Information Science, page 219-231. Springer, (2018)Consensus Conditions of Multi-Agent Systems With Relative-State-Dependent Measurement Noises., , and . CoRR, (2013)PENETRATE: Personalized news recommendation using ensemble hierarchical clustering., , , and . Expert Syst. Appl., 40 (6): 2127-2136 (2013)HSI-CNN: A Novel Convolution Neural Network for Hyperspectral Image., , , , and . CoRR, (2018)Probabilistic missing-tag detection and energy-time tradeoff in large-scale RFID systems., , , and . MobiHoc, page 95-104. ACM, (2012)