Author of the publication

Knowledge Extraction from Chinese Records of Cyber Attacks Based on a Semantic Grammar.

, , , and . KSEM, volume 9983 of Lecture Notes in Computer Science, page 55-68. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An improved adaptation algorithm for signer-independent sign language recognition., , and . IJISTA, 17 (4): 427-438 (2018)Accelerated Visual Inertial Navigation via Fragmented Structure Updates., , and . IROS, page 5358-5363. IEEE, (2019)Stability in distribution of stochastic functional differential equations., , and . Syst. Control. Lett., (2019)事件常识的获取方法研究 (Method of Acquiring Event Commonsense Knowledge)., , , , and . 计算机科学, 42 (10): 217-221 (2015)A transparent silk-fibroin-based triboelectric microgenerator for airflow energy harvesting., , , , and . NEMS, page 65-68. IEEE, (2017)An attention-based context-informed deep framework for infant brain subcortical segmentation., , , , , , and . NeuroImage, (April 2023)A 4D infant brain volumetric atlas based on the UNC/UMN baby connectome project (BCP) cohort., , , , , , , , and . NeuroImage, (2022)Smoothed amplitude flow-based phase retrieval algorithm., , and . J. Frankl. Inst., 358 (14): 7270-7285 (2021)FPGA-Based Implementation and Synchronization Design of a New Five-Dimensional Hyperchaotic System., , , , , and . Entropy, 24 (9): 1179 (2022)Software crowdsourcing for developing Software-as-a-Service., , , and . Frontiers Comput. Sci., 9 (4): 554-565 (2015)