Author of the publication

Effective In-vehicle Intrusion Detection via Multi-view Statistical Graph Learning on CAN Messages.

, , , , and . CoRR, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research Notes: User Identification Model Based on Mouse Behaviors., , , , and . International Journal of Software Engineering and Knowledge Engineering, 28 (2): 175-192 (2018)Contrastive graph neural network-based camouflaged fraud detector., , , , and . Inf. Sci., (2022)AAE-DSVDD: A one-class classification model for VPN traffic identification., , , , , and . Comput. Networks, (November 2023)Process-Oriented heterogeneous graph learning in GNN-Based ICS anomalous pattern recognition., , , and . Pattern Recognit., (September 2023)Dynamic Adjusting ABC-SVM Anomaly Detection Based on Weighted Function Code Correlation., , , , , and . ML4CS (1), volume 12486 of Lecture Notes in Computer Science, page 1-11. Springer, (2020)A Recommendation System Based on Regression Model of Three-Tier Network Architecture., , , and . IJDSN, (2016)A proactive discovery and filtering solution on phishing websites., , , , and . IEEE BigData, page 2348-2355. IEEE Computer Society, (2015)A Worm Behavioral Approach to Susceptible Host Detection., , and . GCC, volume 3795 of Lecture Notes in Computer Science, page 77-83. Springer, (2005)Active Learning for Uneven Noisy Labeled Data in Mention-Level Relation Extraction., , , and . IEEE Access, (2019)A novel approach for Web page modeling in personal information extraction., , , , , and . World Wide Web, 22 (2): 603-620 (2019)