Author of the publication

Traffic Anomaly Detection Model of Electric Power Industrial Control Based on DBN-LSTM.

, , and . HPCC/DSS/SmartCity/DependSys, page 1902-1907. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application of Internet Big Data in Network Security Situation Assessment., , and . BDMIP, page 77-81. ACM, (2023)Security Data Fusion Method for IoT Perception Layer for New Electric Power Systems., , and . BDMIP, page 82-87. ACM, (2023)A Binary Code Vulnerability Mining Method Based on Generative Adversarial Networks., , and . ICAIS (3), volume 13340 of Lecture Notes in Computer Science, page 639-650. Springer, (2022)Traffic Anomaly Detection Model of Electric Power Industrial Control Based on DBN-LSTM., , and . HPCC/DSS/SmartCity/DependSys, page 1902-1907. IEEE, (2021)Research on the Application of Blockchain Technology in the Construction of User Privacy Information Security Model., , and . BDMIP, page 72-76. ACM, (2023)YQFC: a web tool to compare quantitative biological features between two yeast gene lists., , , and . Database J. Biol. Databases Curation, (2020)Absorption and fluorescence emission spectroscopic characters of naphtho-homologated yy-DNA bases and effect of methanol solution and base pairing., , , , and . J. Comput. Chem., 31 (4): 825-836 (2010)Information Literacy Training in Public Libraries: A Case from Canada.. J. Educ. Technol. Soc., 14 (2): 81-88 (2011)Study on Tire Imprint Image Recognition Based on FFT Image Differencing Algorithm., , , and . FSKD (2), page 504-508. IEEE Computer Society, (2008)978-0-7695-3305-6.The Role and Potential Applications of Cloud Computing in the Banking Industry., and . DeSE, page 293-298. IEEE, (2023)