From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Fine-grained P2P traffic classification by simply counting flows., , , и . Frontiers Inf. Technol. Electron. Eng., 16 (5): 391-403 (2015)Feedback based Sampling for Intrusion Detection in Software Defined Network., , , и . ICCSP, стр. 95-99. ACM, (2018)MADDC: Multi-Scale Anomaly Detection, Diagnosis and Correction for Discrete Event Logs., , , , , , , и . ACSAC, стр. 769-784. ACM, (2022)A Novel Android Malware Detection Approach Based on Convolutional Neural Network., , и . ICCSP, стр. 144-149. ACM, (2018)Defending against Adversarial Attacks in Federated Learning on Metric Learning Model., , , и . TrustCom, стр. 197-206. IEEE, (2023)A Blockchain-Based Traffic Conditions and Driving Behaviors Warning Scheme in the Internet of Vehicles., , , , и . ICCT, стр. 1160-1164. IEEE, (2019)Dual-branch combination network (DCN): Towards accurate diagnosis and lesion segmentation of COVID-19 using CT images., , , , , , , , , и 2 other автор(ы). Medical Image Anal., (2021)Detecting Malicious Gradients from Asynchronous SGD on Variational Autoencoder., , и . SRDS, стр. 321-330. IEEE, (2021)PrivacyContext: identifying malicious mobile privacy leak using program context., и . Int. J. Inf. Comput. Secur., 11 (6): 562-584 (2019)Crafting Intents to Detect ICC Vulnerabilities of Android Apps., и . CIS, стр. 557-560. IEEE Computer Society, (2016)