Author of the publication

Analysis of Recent Deep-Learning-Based Intrusion Detection Methods for In-Vehicle Network.

, , , and . IEEE Trans. Intell. Transp. Syst., 24 (2): 1843-1854 (February 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Recommendation System Based on Regression Model of Three-Tier Network Architecture., , , and . IJDSN, (2016)Dynamic Adjusting ABC-SVM Anomaly Detection Based on Weighted Function Code Correlation., , , , , and . ML4CS (1), volume 12486 of Lecture Notes in Computer Science, page 1-11. Springer, (2020)AAE-DSVDD: A one-class classification model for VPN traffic identification., , , , , and . Comput. Networks, (November 2023)Contrastive graph neural network-based camouflaged fraud detector., , , , and . Inf. Sci., (2022)Process-Oriented heterogeneous graph learning in GNN-Based ICS anomalous pattern recognition., , , and . Pattern Recognit., (September 2023)Research Notes: User Identification Model Based on Mouse Behaviors., , , , and . International Journal of Software Engineering and Knowledge Engineering, 28 (2): 175-192 (2018)A proactive discovery and filtering solution on phishing websites., , , , and . IEEE BigData, page 2348-2355. IEEE Computer Society, (2015)A Worm Behavioral Approach to Susceptible Host Detection., , and . GCC, volume 3795 of Lecture Notes in Computer Science, page 77-83. Springer, (2005)A novel approach for Web page modeling in personal information extraction., , , , , and . World Wide Web, 22 (2): 603-620 (2019)An Interactive Traffic Replay Method in a Scaled-Down Environment., , , and . IEEE Access, (2019)