From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Lightweight and Efficient IoT Intrusion Detection Method Based on Feature Grouping., , , , и . IEEE Internet Things J., 11 (2): 2935-2949 (января 2024)QueryPose: Sparse Multi-Person Pose Regression via Spatial-Aware Part-Level Query., , , , , , и . NeurIPS, (2022)Research on Data Visualization in Different Scenarios., , , , и . HCC, том 11354 из Lecture Notes in Computer Science, стр. 232-243. Springer, (2018)An N-gram Based Deep Learning Method for Network Traffic Classification., , и . ICAIS (2), том 12737 из Lecture Notes in Computer Science, стр. 289-304. Springer, (2021)Reinforcement Learning Meets Network Intrusion Detection: A Transferable and Adaptable Framework for Anomaly Behavior Identification., , , , , и . IEEE Trans. Netw. Serv. Manag., 21 (2): 2477-2492 (апреля 2024)Interpretability Framework of Network Security Traffic Classification Based on Machine Learning., , и . ICAIS (2), том 12737 из Lecture Notes in Computer Science, стр. 305-320. Springer, (2021)between flow and bytes., , , и . BigDataService, стр. 179-180. IEEE, (2022)AdaptivePose: Human Parts as Adaptive Points., , , , , и . AAAI, стр. 2813-2821. AAAI Press, (2022)Analysis on Structural Vulnerability Under the Asymmetric Information., , , и . HCC, том 10745 из Lecture Notes in Computer Science, стр. 503-515. Springer, (2017)Network Intrusion Detection Based on an Efficient Neural Architecture Search., , , , и . Symmetry, 13 (8): 1453 (2021)