Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Malicious Web Request Detection Using Character-level CNN., , and . CoRR, (2018)Reasoning about Block-based Cloud Storage Systems., , , , , and . CoRR, (2019)A Multivariate Time Series Classification Method Based on Self-attention., , , and . ICGEC, volume 1107 of Advances in Intelligent Systems and Computing, page 491-499. Springer, (2019)A highly efficient dynamic router for application-oriented network on chip., , , , and . J. Supercomput., 74 (7): 2905-2915 (2018)Multi-objective optimisation in flexible assembly job shop scheduling using a distributed ant colony system., , , and . Eur. J. Oper. Res., 283 (2): 441-460 (2020)A lane change prediction algorithm based on probabilistic modeling., , and . CIPAE, page 211-216. ACM, (2020)PhishHunter: Detecting camouflaged IDN-based phishing attacks via Siamese neural network., , , , and . Comput. Secur., (March 2024)Maximum Fuzzy Consensus Feedback Mechanism With Minimum Cost and Private Interest in Group Decision-Making., , , and . IEEE Trans. Fuzzy Syst., 29 (9): 2689-2700 (2021)Twitter Stance Detection via Neural Production Systems., , , , , and . ICASSP, page 1-5. IEEE, (2023)Cross-Domain Sentiment Classification by Capsule Network With Semantic Rules., , , , and . IEEE Access, (2018)