Author of the publication

New deep learning method to detect code injection attacks on hybrid applications.

, , , , and . J. Syst. Softw., (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SAVT: A Practical Scheme for Source Address Validation and Traceback in Campus Network., , , and . ICCCN, page 1-8. IEEE, (2011)Towards a SDN-Based Integrated Architecture for Mitigating IP Spoofing Attack., , , , , , and . IEEE Access, (2018)Balancer: A Traffic-Aware Hybrid Rule Allocation Scheme in Software Defined Networks., , , , and . ICCCN, page 1-9. IEEE, (2017)Non-local Self-attention Structure for Function Approximation in Deep Reinforcement Learning., , , , , , , and . ICASSP, page 3042-3046. IEEE, (2019)A Novel and High-Accuracy Rumor Detection Approach using Kernel Subtree and Deep Learning Networks., , , , , and . IJCNN, page 1-8. IEEE, (2021)BehavSniffer: Sniff User Behaviors from the Encrypted Traffic by Traffic Burst Graphs., , , , , , and . SECON, page 456-464. IEEE, (2023)LocalStyleFool: Regional Video Style Transfer Attack Using Segment Anything Model., , , , , , , and . CoRR, (2024)SAIDR: A New Dynamic Model for SMS-Based Worm Propagation in Mobile Networks., , , , , and . IEEE Access, (2017)Modeling and validation of SMS worm propagation over social networks., , , , and . J. Comput. Sci., (2017)DetOH: An Anchor-Free Object Detector with Only Heatmaps., , , , , and . ADMA (2), volume 14177 of Lecture Notes in Computer Science, page 152-167. Springer, (2023)