Author of the publication

Interpretable deep learning method for attack detection based on spatial domain attention.

, , , and . ISCC, page 1-6. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Managing and Collaboratively Processing Medical Image via the Web., , , , , and . WAIM Workshops, volume 7419 of Lecture Notes in Computer Science, page 252-263. Springer, (2012)Outsourced KP-ABE with Enhanced Security., , and . INTRUST, volume 9473 of Lecture Notes in Computer Science, page 36-50. Springer, (2014)A general image representation scheme and its improvement for image analysis., , and . ICSAI, page 736-741. IEEE, (2014)A bio-inspired model of image representation based on non-classical receptive fields., , and . ICSAI, page 730-735. IEEE, (2014)A computational trust model for access control in P2P.. Sci. China Inf. Sci., 53 (5): 896-910 (2010)Hyperbolic distance guided multi-positive graph contrastive learning., and . ICMLC, page 183-191. ACM, (2023)Trust Degree based Access Control for Social Networks.. SECRYPT, page 43-48. SciTePress, (2010)GIGAN: Self-supervised GAN for generating the invisible using cycle transformation and conditional normalization., and . IET Image Process., 17 (9): 2736-2747 (2023)AspIOC: Aspect-Enhanced Deep Neural Network for Actionable Indicator of Compromise Recognition., , , and . ISC, volume 13640 of Lecture Notes in Computer Science, page 411-421. Springer, (2022)Efficient semi-supervised annotation with Proxy-based Local Consistency Propagation., , , and . ICME, page 1-6. IEEE Computer Society, (2013)