Author of the publication

Allocating Limited Resources to Protect a Massive Number of Targets using a Game Theoretic Model.

, , , , , , and . CoRR, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bidirectional IndRNN malicious webpages detection algorithm based on convolutional neural network and attention mechanism., , , , , and . J. Intell. Fuzzy Syst., 38 (2): 1929-1941 (2020)Combining multi-features with a neural joint model for Android malware detection., , , , and . J. Intell. Fuzzy Syst., 38 (2): 2151-2163 (2020)Bidirectional LSTM Malicious webpages detection algorithm based on convolutional neural network and independent recurrent neural network., , , , and . Appl. Intell., 49 (8): 3016-3026 (2019)Object Tracking via Multi-task Gaussian-Laplacian Regression., , , and . ACPR, page 405-409. IEEE, (2013)Performance Analysis of Adaptive Detectors for a Distributed Target Based on Subspace Model., , , , and . CSSP, 37 (6): 2651-2664 (2018)The design and implementation of online-video syndication and program recommendation system., , , and . FSKD, page 2813-2817. IEEE, (2012)A new goal ordering for incremental planning., , , and . J. Supercomput., 76 (5): 3713-3728 (2020)Pathway-based gene-gene interaction network modelling to predict potential biomarkers of essential hypertension., , , , , , and . Biosyst., (2018)Multi-Dimensional Affinity Propagation Clustering Applying a Machine Learning in 5G-Cellular V2X., , , , , and . IEEE Access, (2020)Study on Restoration-Oriented Digital Visualization for Architectural Trim-Work of Guanlan Hall in Yuanming Yuan., , , and . HCI (13), volume 12193 of Lecture Notes in Computer Science, page 573-594. Springer, (2020)