Author of the publication

Immune Multi-agent Active Defense Model for Network Intrusion.

, , , , , , , and . SEAL, volume 4247 of Lecture Notes in Computer Science, page 104-111. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LongFNT: Long-Form Speech Recognition with Factorized Neural Transducer., , , , , , and . ICASSP, page 1-5. IEEE, (2023)Multi-level Temporal-Guided Graph Convolutional Networks for Skeleton-Based Action Recognition., and . CCBR, volume 13628 of Lecture Notes in Computer Science, page 267-275. Springer, (2022)Irreversible synthesis of an ultrastrong two-dimensional polymeric material, , , , , , , , , and 11 other author(s). Nature, 602 (7895): 91--95 (Feb 1, 2022)Bounding box regression with balance for harmonious object detection., and . J. Vis. Commun. Image Represent., (2022)An Online Data-Driven Method for Microgrid Secondary Voltage and Frequency Control with Ensemble Koopman Modeling., , and . CoRR, (2022)A Discriminative Multi-Channel Facial Shape (MCFS) Representation and Feature Extraction for 3D Human Faces., , , and . Comput. Graph. Forum, 39 (6): 66-81 (2020)End-to-End Texture-Aware and Depth-Aware Embedded Advertising for Videos., , and . ICCTA, page 57-61. ACM, (2020)A Novel Deformation Framework for Face Modeling from a Few Control Points., and . RSKT, volume 5009 of Lecture Notes in Computer Science, page 434-441. Springer, (2008)Grid Intrusion Detection Based on Immune Agent., , , , , and . ICNC (2), volume 4222 of Lecture Notes in Computer Science, page 73-82. Springer, (2006)Fingerprinting websites using remote traffic analysis., , and . CCS, page 684-686. ACM, (2010)