Author of the publication

Research on Data Visualization in Different Scenarios.

, , , , and . HCC, volume 11354 of Lecture Notes in Computer Science, page 232-243. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Lightweight and Efficient IoT Intrusion Detection Method Based on Feature Grouping., , , , and . IEEE Internet Things J., 11 (2): 2935-2949 (January 2024)QueryPose: Sparse Multi-Person Pose Regression via Spatial-Aware Part-Level Query., , , , , , and . NeurIPS, (2022)Research on Data Visualization in Different Scenarios., , , , and . HCC, volume 11354 of Lecture Notes in Computer Science, page 232-243. Springer, (2018)An N-gram Based Deep Learning Method for Network Traffic Classification., , and . ICAIS (2), volume 12737 of Lecture Notes in Computer Science, page 289-304. Springer, (2021)Reinforcement Learning Meets Network Intrusion Detection: A Transferable and Adaptable Framework for Anomaly Behavior Identification., , , , , and . IEEE Trans. Netw. Serv. Manag., 21 (2): 2477-2492 (April 2024)Interpretability Framework of Network Security Traffic Classification Based on Machine Learning., , and . ICAIS (2), volume 12737 of Lecture Notes in Computer Science, page 305-320. Springer, (2021)between flow and bytes., , , and . BigDataService, page 179-180. IEEE, (2022)AdaptivePose: Human Parts as Adaptive Points., , , , , and . AAAI, page 2813-2821. AAAI Press, (2022)Analysis on Structural Vulnerability Under the Asymmetric Information., , , and . HCC, volume 10745 of Lecture Notes in Computer Science, page 503-515. Springer, (2017)Network Intrusion Detection Based on an Efficient Neural Architecture Search., , , , and . Symmetry, 13 (8): 1453 (2021)