Author of the publication

Immunity-Based Model for Malicious Code Detection.

, , , and . ICIC (1), volume 6215 of Lecture Notes in Computer Science, page 399-406. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Sub-captions Semantic-Guided Network for Image Captioning., , , , , and . ICIC (3), volume 13395 of Lecture Notes in Computer Science, page 367-379. Springer, (2022)Adapting to Continuous Covariate Shift via Online Density Ratio Estimation., , , and . CoRR, (2023)Adaptive Learning for Weakly Labeled Streams., , , , and . KDD, page 2556-2564. ACM, (2022)Feature based fuzzy inference system for segmentation of low-contrast infrared ship images., , , , , and . Appl. Soft Comput., (2016)Water leakage image recognition of shield tunnel via learning deep feature representation., , and . J. Vis. Commun. Image Represent., (2020)A Comparison of End-to-End Models for Long-Form Speech Recognition., , , , , , , , , and 4 other author(s). ASRU, page 889-896. IEEE, (2019)Rateless Coded Downlink Transmission in Cloud Radio Access Network., , , , and . MLICOM, volume 251 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 438-448. Springer, (2018)Towards 5G High Mobility: A Fairness-Adjustable Time-Domain Power Allocation Approach., , , and . IEEE Access, (2017)Outage Probability of Overhearing Amplify-and-Forward Cooperative Relaying., and . CoRR, (2015)Linked Component Analysis From Matrices to High-Order Tensors: Applications to Biomedical Data., , , , , and . Proc. IEEE, 104 (2): 310-331 (2016)