Author of the publication

CoNN-IDS: Intrusion detection system based on collaborative neural networks and agile training.

, , , , , and . Comput. Secur., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An improved alignment layer grown by oblique evaporation for liquid crystal devices., , , , , , and . Displays, 27 (2): 69-72 (2006)Integrate Gamification into Questionnaire Design., , and . HCI (1), volume 14011 of Lecture Notes in Computer Science, page 18-29. Springer, (2023)Secure session between an IoT device and a cloud server based on elliptic curve cryptosystem., , , , and . Int. J. Inf. Comput. Secur., 15 (1): 67-87 (2021)Preserving Liberty and Fairness in Combinatorial Double Auction Games Based on Blockchain., , , and . IEEE Syst. J., 15 (3): 3517-3527 (2021)Learning salient seeds refer to the manifold ranking and background-prior strategy., , , , and . Multimedia Tools Appl., 79 (9-10): 5859-5879 (2020)CoNN-IDS: Intrusion detection system based on collaborative neural networks and agile training., , , , , and . Comput. Secur., (2022)AAVSS: Auxiliary Authorization Mechanism Based on Arbitrary-Angle VSS., , , , and . Int. J. Netw. Secur., 21 (4): 537-544 (2019)Profiling Operations of Cyber Army in Manipulating Public Opinions., , , , , and . ICFET, page 222-225. ACM, (2020)Medical blockchain: Data sharing and privacy preserving of EHR based on smart contract., , , , and . J. Inf. Secur. Appl., (2022)Provable Secure Brand-new Multi-auction Mechanism with Dynamic Identity., , , and . KSII Trans. Internet Inf. Syst., 10 (12): 5616-5642 (2016)