From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Malicious Domain Name Recognition Based on Deep Neural Networks., , и . SpaCCS, том 11342 из Lecture Notes in Computer Science, стр. 497-505. Springer, (2018)A Domain Embedding Model for Botnet Detection Based on Smart Blockchain., , , и . IEEE Internet Things J., 11 (5): 8005-8018 (2024)Hinge Classification Algorithm Based on Asynchronous Gradient Descent., , , и . BWCCA, том 12 из Lecture Notes on Data Engineering and Communications Technologies, стр. 459-468. Springer, (2017)Moving Target Defense Against Injection Attacks., , , , и . ICA3PP (1), том 11944 из Lecture Notes in Computer Science, стр. 518-532. Springer, (2019)T-S fuzzy system identification based on support vector machine., , и . ICCA, стр. 1098-1102. IEEE, (2010)Revisiting Swapping in User-space with Lightweight Threading., , , , , , , и . CoRR, (2021)Anti-Congestion Algorithm for Multiple Data Unicast Transmission in the Internet of Brain Things., , и . IEEE Access, (2018)Studies of the human brain neural network: methods and application.. Rensselaer Polytechnic Institute, USA, (2012)Trustworthy Network Anomaly Detection Based on an Adaptive Learning Rate and Momentum in IIoT., , , , , и . IEEE Trans. Ind. Informatics, 16 (9): 6182-6192 (2020)Hierarchical Bidirectional RNN for Safety-Enhanced B5G Heterogeneous Networks., , , , , и . IEEE Trans. Netw. Sci. Eng., 8 (4): 2946-2957 (2021)