Author of the publication

U-ASG: A Universal Method to Perform Adversarial Attack on Autoencoder based Network Anomaly Detection Systems.

, , , and . INFOCOM Workshops, page 68-73. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Preliminary Observations from the China Fengyun-4A Lightning Mapping Imager and Its Optical Radiation Characteristics., , , and . Remote. Sens., 12 (16): 2622 (2020)Study of Cl-(H2O)n (n = 1-4) using basin-hopping method coupled with density functional theory., , , , , , , and . J. Comput. Chem., 35 (2): 159-165 (2014)Decision-Making of Closed-Loop Supply Chain Strategic Alliance Considering the Quality Level of Remanufactured Products and Patent Protection., , , and . Asia Pac. J. Oper. Res., 37 (5): 2050021:1-2050021:27 (2020)Security OSIF: Toward Automatic Discovery and Analysis of Event Based Cyber Threat Intelligence., , , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 741-747. IEEE, (2018)A graph neural network based efficient firmware information extraction method for IoT devices., , , , and . IPCCC, page 1-8. IEEE, (2018)MSTNN: A Graph Learning Based Method for the Origin-Destination Traffic Prediction., , , and . ICC, page 1-6. IEEE, (2020)Applications of single-cell technology on bacterial analysis., , , , , , and . Quant. Biol., 7 (3): 171-181 (2019)A multi-scale reconstruction method for the anomaly detection in stochastic dynamic networks., , , , and . Neurocomputing, (2023)MalAder: Decision-Based Black-Box Attack Against API Sequence Based Malware Detectors., , , , , , and . DSN, page 165-178. IEEE, (2023)Effective load balancing for cloud-based multimedia system., , , and . EMEIT, page 165-168. IEEE, (2011)