Author of the publication

Research on an Immune Mechanism Based Intelligent Spam Filter.

, , and . CSSE (3), page 673-676. IEEE Computer Society, (2008)978-0-7695-3336-0.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lowering systolic blood pressure to less than 120 mm Hg versus less than 140 mm Hg in patients with high cardiovascular risk with and without diabetes or previous stroke: an open-label, blinded-outcome, randomised trial, , , , , , , , , and 736 other author(s). (2024)The immune evolutionary programming and its convergence, and . Late Breaking Papers at the 1999 Genetic and Evolutionary Computation Conference, page 175--183. Orlando, Florida, USA, (13 July 1999)A Novel Recursive Bayesian Learning-Based Method for the Efficient and Accurate Segmentation of Video With Dynamic Background., , , and . IEEE Trans. Image Processing, 21 (9): 3865-3876 (2012)Feature Selection and Predictors of Falls with Foot Force Sensors Using KNN-Based Algorithms., , , , , , and . Sensors, 15 (11): 29393-29407 (2015)A Framework for Loop Distribution on Limited On-Chip Memory Processors., , and . CC, volume 1781 of Lecture Notes in Computer Science, page 141-156. Springer, (2000)Internet of Things Security Analysis of Smart Campus., , and . ICCCS (5), volume 11067 of Lecture Notes in Computer Science, page 418-428. Springer, (2018)Finding Preimages of Tiger Up to 23 Steps., and . FSE, volume 6147 of Lecture Notes in Computer Science, page 116-133. Springer, (2010)Selective Ensemble Algorithms of Support Vector Machines Based on Constraint Projection., and . ISNN (2), volume 5552 of Lecture Notes in Computer Science, page 287-295. Springer, (2009)A Fast and Accurate Progressive Algorithm for Training Transductive SVMs., , and . ISNN (3), volume 4493 of Lecture Notes in Computer Science, page 497-505. Springer, (2007)Security of Practical Cryptosystems Using Merkle-Damgård Hash Function in the Ideal Cipher Model., , , and . ProvSec, volume 6980 of Lecture Notes in Computer Science, page 281-296. Springer, (2011)