Author of the publication

Intrusion detection on internet of vehicles via combining log-ratio oversampling, outlier detection and metric learning.

, , , , and . Inf. Sci., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attribute Uncertainty in GIS Data., , , and . FSKD (2), volume 3614 of Lecture Notes in Computer Science, page 614-623. Springer, (2005)Brightness of Nighttime Lights as a Proxy for Freight Traffic: A Case Study of China., , , and . IEEE J Sel. Topics in Appl. Earth Observ. and Remote Sensing, 7 (1): 206-212 (2014)Intrusion detection on internet of vehicles via combining log-ratio oversampling, outlier detection and metric learning., , , , and . Inf. Sci., (2021)Vulnerability assessments of weighted urban rail transit networks with integrated coupled map lattices., , , , , and . Reliab. Eng. Syst. Saf., (2021)MQRLD: A Multimodal Data Retrieval Platform with Query-aware Feature Representation and Learned Index Based on Data Lake., , , , , , and . CoRR, (2024)Spatiotemporal Crime Hotspots Analysis and Crime Occurrence Prediction., , and . ADMA, volume 11888 of Lecture Notes in Computer Science, page 579-588. Springer, (2019)The Prediction of CTR Based on Model Fusion Theory., , , and . GRMSE (2), volume 699 of Communications in Computer and Information Science, page 90-100. Springer, (2016)Human facial expression mining based on cloud model., , , and . GrC, page 557-560. IEEE Computer Society, (2009)Discovering community membership in biological networks with node topology potential., , and . GrC, page 541-546. IEEE Computer Society, (2012)Cost-Effective Big Data Mining in the Cloud: A Case Study with K-means., , , , , and . CLOUD, page 74-81. IEEE Computer Society, (2017)