Author of the publication

Adversarial Attack against LSTM-based DDoS Intrusion Detection System.

, , , and . ICTAI, page 686-693. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Periodic Action Temporal Localization Method Based on Two-Path Architecture for Product Counting in Sewing Video., , , , and . ICIC (3), volume 11645 of Lecture Notes in Computer Science, page 568-580. Springer, (2019)PON: Proposal Optimization Network for Temporal Action Proposal Generation., , and . ICIC (3), volume 12465 of Lecture Notes in Computer Science, page 145-157. Springer, (2020)The parameter optimization based on LVPSO algorithm for detecting multi-step attacks., , , , , and . CF, page 24-31. ACM, (2019)A Topic Approach to Sentence Ordering for Multi-document Summarization., , , , , and . Trustcom/BigDataSE/ISPA, page 1390-1395. IEEE, (2016)Randomised sequential and parallel algorithms for efficient quorum planted motif search., , and . IJDMB, 18 (2): 105-124 (2017)Novel Hesitant Fuzzy Linguistic Multi-Attribute Group Decision Making Method Based on Improved Supplementary Regulation and Operational Laws., , , , , and . IEEE Access, (2019)Improving scheduling efficiency by probabilistic execution time model in cloud environments., , and . Int. J. Netw. Virtual Organisations, 18 (4): 307-322 (2018)A Novel Cloud Monitoring Framework with Enhanced QoS Supporting., and . IJeC, 15 (4): 31-45 (2019)Improving the energy efficiency and performance of data-intensive workflows in virtualized clouds., , and . J. Supercomput., 74 (7): 2935-2955 (2018)Improving energy-efficiency of large-scale workflows in heterogeneous systems., and . Int. J. Comput. Sci. Eng., 13 (3): 258-267 (2016)