Author of the publication

Immunity-Based Model for Malicious Code Detection.

, , , and . ICIC (1), volume 6215 of Lecture Notes in Computer Science, page 399-406. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance analysis of Rayleigh fading ad hoc networks with regular topology., and . GLOBECOM, page 5. IEEE, (2005)Weakly-supervised Salient Object Detection with Label Decoupling Siamese Network., , and . ICCAI, page 412-418. ACM, (2022)A Convolutional Denoising Autoencoder for Protein Scaffold Filling., , , , and . ISBRA, volume 14248 of Lecture Notes in Computer Science, page 518-529. Springer, (2023)CTC-based Non-autoregressive Speech Translation., , , , , , , , , and 2 other author(s). ACL (1), page 13321-13339. Association for Computational Linguistics, (2023)Spectral probabilities of top-down tandem mass spectra., , , and . BMC Genom., 15 (S-1): S9 (2014)Compare with Vices or Virtues? The Effect of Comparison Object Type on Consumer Purchase Intention to Low-Calorie Products., , and . WHICEB, page 67. Association for Information Systems, (2022)A detection method of individual fare evasion behaviours on metros based on skeleton sequence and time series., , , , , , and . Inf. Sci., (2022)Effects of the Exoskeleton on Human Physiological Stress., , , , , , , and . HCI (56), volume 2114 of Communications in Computer and Information Science, page 381-386. Springer, (2024)CMOS Electrochemical Instrumentation for Biosensor Microsystems: A Review., , , , , and . Sensors, 17 (1): 74 (2017)Sorting a Permutation by Best Short Swaps., , , , , and . Algorithmica, 83 (7): 1953-1979 (2021)