Author of the publication

In-vehicle network intrusion detection systems: a systematic survey of deep learning-based approaches.

, , , , , and . PeerJ Comput. Sci., (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Co-Simulation-and-Test Method for CAN Bus System., and . J. Commun., 8 (10): 681-689 (2013)Fashionable Technology, Fashion Waves, and Post-Adoption Regret and Satisfaction., , , and . ICIS, Association for Information Systems, (2014)Big Data Analytics on Traditional HPC Infrastructure Using Two-Level Storage., , , and . CoRR, (2015)Quadrilateral Mesh Generation II : Meromorphic Quartic Differentials and Abel-Jacobi Condition., , , , and . CoRR, (2019)Rigidity of Polyhedral Surfaces, III. (2010)cite arxiv:1010.3284 Comment: 17 pages, 1 figure.Discrete heat kernel determines discrete Riemannian metric., , , and . Graph. Model., 74 (4): 121-129 (2012)Automatic Road Extraction from High-Resolution Remote Sensing Images Using a Method Based on Densely Connected Spatial Feature-Enhanced Pyramid., , , , , and . IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., (2021)Accelerating big data analytics on HPC clusters using two-level storage., , , , and . Parallel Comput., (2017)BlockPolish: accurate polishing of long-read assembly via block divide-and-conquer., , , , , and . Briefings Bioinform., (2022)Computing surface hyperbolic structure and real projective structure., , and . Symposium on Solid and Physical Modeling, page 105-116. ACM, (2006)