Author of the publication

A PSO-based Wavelet-core ELM for Abnormal Flow Detection.

, , and . Int. J. Netw. Secur., 22 (2): 306-313 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

手机流量非侵入式监测的决策树算法 (Decision Tree Algorithm in Non-invasive Monitoring Cell Phone Traffic)., , and . 计算机科学, 43 (Z6): 361-364 (2016)Computational source term estimation of the Gaussian puff dispersion., , and . Soft Comput., 23 (1): 59-75 (2019)SIFT Feature-Based Second-Order Image Hash Retrieval Approach., , and . J. Softw., 13 (2): 103-116 (2018)A dubiety-determining based model for database cumulated anomaly intrusion., , and . Infoscale, volume 304 of ACM International Conference Proceeding Series, page 56. ACM, (2007)Data Recovery Based on Intelligent Pattern Matching., , and . e-Forensics, volume 56 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 193-199. Springer, (2010)A PSO-based Wavelet-core ELM for Abnormal Flow Detection., , and . Int. J. Netw. Secur., 22 (2): 306-313 (2020)Newly Emerging Nature-Inspired Optimization - Algorithm Review, Unified Framework, Evaluation, and Behavioural Parameter Optimization., , , , , , and . IEEE Access, (2020)Hybrid particle swarm optimisation approach for 3D path planning of UAV., , and . Int. J. Bio Inspired Comput., 22 (4): 227-236 (2023)Learning-Based Detection for Malicious Android Application Using Code Vectorization., , , , , and . Secur. Commun. Networks, (2021)Steganalysis Using Unsupervised End-to-End CNN Fused with Residual Image., , and . CISP-BMEI, page 1-5. IEEE, (2018)