Author of the publication

Explainable cyber threat behavior identification based on self-adversarial topic generation.

, , , , and . Comput. Secur., (September 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Train Route Information Visual Distance Extension and Analysis of Driver Cognitive Reliability., , , , and . IEEE Trans. Reliab., 70 (2): 602-612 (2021)Sparse imaging based on SAR complex image domain., , , and . IGARSS, page 945-948. IEEE, (2013)SAR imaging based on Compressed Sensing., , , , and . IGARSS, page 1674-1677. IEEE, (2011)An improved time-frequency phase adjustment technique for ISAR., , and . IGARSS, page 5170-5173. IEEE, (2007)A Novel CS Model and Its Application in Complex SAR Image Compression., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 96-A (11): 2209-2217 (2013)基于SLE范式的社群化制造计算实验比较研究 (Comparative Research on Computational Experiment of Social Manufacturing Based on Social Learning Evolution Paradigm)., , , and . 计算机科学, 45 (2): 140-146 (2018)A study on attention-based LSTM for abnormal behavior recognition with variable pooling., , , , and . Image Vis. Comput., (2021)Markov-GAN: Markov image enhancement method for malicious encrypted traffic classification., , , , , and . IET Inf. Secur., 16 (6): 442-458 (2022)Research on Length Design and Dynamic Usage Strategy of Railway Successive Routes., , , , and . IEEE Access, (2021)CRSPR: PageRank for Android Apps., , , , , , , and . IEEE Access, (2017)