From post

Intrusion Detection Based on Fusing Deep Neural Networks and Transfer Learning.

, , , , , , , и . IFTC, том 1181 из Communications in Computer and Information Science, стр. 212-223. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Integrative System for Deep Packet Inspection and Network Anomaly Detection amp; Defense, , , , и . Wireless Communications, Networking and Mobile Computing (WiCOM), 2011 7th International Conference on, стр. 1-4. (2011)WIM: A Wage-Based Incentive Mechanism for Reinforcing Truthful Feedbacks in Reputation Systems., , и . GLOBECOM, стр. 1-5. IEEE, (2010)Automatic detection of retinal vascular bifurcations and crossovers based on isotropy and anisotropy., , , , , и . Medical Imaging: Image Processing, том 8669 из SPIE Proceedings, стр. 86691T. SPIE, (2013)A 2.5-GHz band low-voltage high efficiency class-E power amplifier IC with body effect., , , , и . ISIC, стр. 160-163. IEEE, (2014)Indutivo: Contact-Based, Object-Driven Interactions with Inductive Sensing., , , , и . UIST, стр. 321-333. ACM, (2018)Maximum-Likelihood Deformation Analysis of Different-Sized Fingerprints., , , и . AVBPA, том 2688 из Lecture Notes in Computer Science, стр. 421-428. Springer, (2003)Face Recognition Using Direct-Weighted LDA., и . PRICAI, том 3157 из Lecture Notes in Computer Science, стр. 760-768. Springer, (2004)Monitoring Freeze Injury and Evaluating Losing to Sugar-Cane Using RS and GPS., , , , и . CCTA (1), том 293 из IFIP Advances in Information and Communication Technology, стр. 307-316. Springer, (2008)A Kernel Matching Pursuit Approach to Man-Made Objects Detection in Aerial Images., , и . IbPRIA (2), том 4478 из Lecture Notes in Computer Science, стр. 507-514. Springer, (2007)Multi-scale block local ternary patterns for fingerprints vitality detection., , , , , , и . ICB, стр. 1-6. IEEE, (2013)