Author of the publication

Matrix Differential Decomposition-Based Anomaly Detection and Localization in NFV Networks.

, , , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Session details: Session 2: Short Oral Session.. CEA@ICMR, ACM, (2019)Practical quantum digital signature with configurable decoy states., , , and . Quantum Inf. Process., 19 (5): 151 (2020)Secure Enforcement in Cognitive Internet of Vehicles., , , , and . IEEE Internet of Things Journal, 5 (2): 1242-1250 (2018)Multi-exposure image fusion quality assessment using contrast information., , , , , and . ISPACS, page 34-38. IEEE, (2017)A fast intra depth map algorithm based on sum-of-gradient and segment-wise direct component coding., , , and . ISPACS, page 191-195. IEEE, (2017)Integrative Systems Biology Approaches to Identify and Prioritize Disease and Drug Candidate Genes, , , , , and . Disease Gene Identification, volume 700 of Methods in Molecular Biology, chapter 16, Humana Press, Totowa, NJ, (2011)Compression of 3D point clouds using 1D discrete cosine transform., , , , , and . ISPACS, page 196-200. IEEE, (2017)Use of Phishing Training to Improve Security Warning Compliance: Evidence from a Field Experiment., , , , and . HotSoS, page 52-61. ACM, (2017)A Projection Pursuit Based Risk Assessment Method in Mobile Ad hoc Networks., , , , and . Int. J. Comput. Intell. Syst., 4 (5): 749-758 (2011)A Graph Layout Framework Combining t-Distributed Neighbor Retrieval Visualizer and Energy Models., , , , , , and . IEEE Access, (2019)