Author of the publication

An Efficient Network Intrusion Detection Model Based on Temporal Convolutional Networks.

, , , , , and . QRS, page 768-775. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

L-KPCA: an efficient feature extraction method for network intrusion detection., , , , and . MSN, page 683-684. IEEE, (2021)An Efficient Network Intrusion Detection Model Based on Temporal Convolutional Networks., , , , , and . QRS, page 768-775. IEEE, (2021)An efficient anomaly detection method for uncertain data based on minimal rare patterns with the consideration of anti-monotonic constraints., , , , , , and . Inf. Sci., (2021)An Efficient Network Traffic Classification Method based on Combined Feature Dimensionality Reduction., , , , and . QRS Companion, page 407-414. IEEE, (2021)A novel classification approach for Android malware based on feature fusion and natural language processing., , , , , and . Internetware, page 28-36. ACM, (2022)An Automatic Vulnerability Scanner for Web Applications., , , , , and . TrustCom, page 1519-1524. IEEE, (2020)A malware detection system based on heterogeneous information network., , , and . RACS, page 154-159. ACM, (2018)LDFGB Algorithm for Anomaly Intrusion Detection., , and . ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 396-404. Springer, (2014)On the fit and forecasting performance of grey prediction models for China's labor formation., and . Math. Comput. Model., 57 (3-4): 357-365 (2013)Mixed-Level Design Methodology With SystemVerilog Behavior Models for Digitally Controlled Power Converter ICs., , , and . GCCE, page 1172-1175. IEEE, (2023)