Author of the publication

Bilateral Insider Threat Detection: Harnessing Standalone and Sequential Activities with Recurrent Neural Networks.

, , , , , and . WISE, volume 14306 of Lecture Notes in Computer Science, page 179-188. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Categorical perception in two pairs of Mandarin tones among bimodal cochlear implanted children., , and . ISCSLP, page 1-5. IEEE, (2016)Adaptive Online Learning for Vulnerability Exploitation Time Prediction., , , , , and . WISE (2), volume 12343 of Lecture Notes in Computer Science, page 252-266. Springer, (2020)A Study on Historical Behaviour Enabled Insider Threat Prediction., , , , , and . APWeb/WAIM (3), volume 14333 of Lecture Notes in Computer Science, page 464-476. Springer, (2023)Data-Driven Hierarchical Neural Network Modeling for High-Pressure Feedwater Heater Group., , , , , and . ADC, volume 12008 of Lecture Notes in Computer Science, page 225-233. Springer, (2020)Bilateral Insider Threat Detection: Harnessing Standalone and Sequential Activities with Recurrent Neural Networks., , , , , and . WISE, volume 14306 of Lecture Notes in Computer Science, page 179-188. Springer, (2023)Vulnerability exploitation time prediction: an integrated framework for dynamic imbalanced learning., , , , , and . World Wide Web, 25 (1): 401-423 (2022)Distributed relay selection with network coding for data dissemination in vehicular ad hoc networks., and . Int. J. Distributed Sens. Networks, (2017)Graph Intelligence Enhanced Bi-Channel Insider Threat Detection., , , , , , and . NSS, volume 13787 of Lecture Notes in Computer Science, page 86-102. Springer, (2022)Production of Sustained Vowels and Categorical Perception of Tones in Mandarin Among Cochlear-Implanted Children., , and . INTERSPEECH, page 1869-1873. ISCA, (2017)Knowledge-Driven Cybersecurity Intelligence: Software Vulnerability Coexploitation Behavior Discovery., , , , , and . IEEE Trans. Ind. Informatics, 19 (4): 5593-5601 (April 2023)