From post

A Model for Detecting Malware Adversarial Samples Based on Anomaly Detection Technology.

, , и . AHPCAI, том 3331 из CEUR Workshop Proceedings, стр. 75-84. CEUR-WS.org, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Ranking algorithm based on relational topic model., , , и . IJCNN, стр. 1-8. IEEE, (2015)High Order Hopfield Network with Self-feedback to Solve Crossbar Switch Problem., , , и . ICONIP (3), том 7064 из Lecture Notes in Computer Science, стр. 315-322. Springer, (2011)Android Malware Detection Method Based on Function Call Graphs., , и . ICONIP (4), том 9950 из Lecture Notes in Computer Science, стр. 70-77. (2016)Source Detection Method Based on Propagation Probability., , , и . ICCC, том 10971 из Lecture Notes in Computer Science, стр. 179-186. Springer, (2018)Object retrival based on visual word pairs., , , и . ICIP, стр. 1929-1932. IEEE, (2012)A Denoising Framework for Image Caption., , , и . DASC/PiCom/DataCom/CyberSciTech, стр. 825-832. IEEE, (2019)Genre identification of Chinese finance text using machine learning method., , , и . SMC, стр. 455-459. IEEE, (2008)A fast malware detection algorithm based on objective-oriented association mining., , , , и . Comput. Secur., (2013)The Gift of Feedback: Improving ASR Model Quality by Learning from User Corrections Through Federated Learning., , , , , , , и . ASRU, стр. 1-7. IEEE, (2023)An Airborne Software FMEA Application Method Based on ARP4761., , , , , и . ICMSS, стр. 32-38. ACM, (2019)