Author of the publication

CSKG4APT: A Cybersecurity Knowledge Graph for Advanced Persistent Threat Organization Attribution.

, , , , and . IEEE Trans. Knowl. Data Eng., 35 (6): 5695-5709 (June 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Advance on Trust Model and Evaluation Method in Social Networks., , , and . ICGEC, page 9-14. IEEE, (2012)ACO based key management routing mechanism for WSN security and data collection., , and . ICIT, page 1935-1939. IEEE, (2018)GCRNet: Global Context Relation Network for Weakly-Supervised Temporal Action Localization: Identify the target actions in a long untrimmed video and find the corresponding action start point and end point., , , , and . ICVIP, page 184-190. ACM, (2021)Lightweight Bimodal Rail Surface Defect Detection Method: Parallel-YOLOv4-Tiny., , , , , , and . ICVIP, page 98-103. ACM, (2021)Combine Object Detection with Skeleton-Based Action Recognition to Detect Smoking Behavior., , , , , , , and . ICVIP, page 111-116. ACM, (2021)Spatiotemporal implicit neural representation for unsupervised dynamic MRI reconstruction., , , , , and . CoRR, (2023)Security, Trust and Risk in Multimedia Social Networks.. Comput. J., 58 (4): 515-517 (2015)A crowdsourcing method for online social networks security assessment based on human-centric computing., , , , and . Hum. centric Comput. Inf. Sci., (2020)CSKG4APT: A Cybersecurity Knowledge Graph for Advanced Persistent Threat Organization Attribution., , , , and . IEEE Trans. Knowl. Data Eng., 35 (6): 5695-5709 (June 2023)Learning-Based Network Boolean Tomography for Identifying Congested Links with Correlations., , , , , and . GLOBECOM, page 1-6. IEEE, (2020)