Author of the publication

Deduplication and Exploitability Determination of UAF Vulnerability Samples by Fast Clustering.

, , and . KSII Trans. Internet Inf. Syst., 10 (10): 4933-4956 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On hexavalent half-arc-transitive bi-dihedrants.. Discret. Math., 347 (12): 114180 (2024)On g-extra connectivity of folded hypercubes., and . Theor. Comput. Sci., (2015)Attention-Guided Multi-Scale Segmentation Neural Network for Interactive Extraction of Region Objects from High-Resolution Satellite Imagery., , , , and . Remote. Sens., 12 (5): 789 (2020)Seismic Noise Attenuation Using Unsupervised Sparse Feature Learning., , , and . IEEE Trans. Geosci. Remote. Sens., 57 (12): 9709-9723 (2019)Deduplication and Exploitability Determination of UAF Vulnerability Samples by Fast Clustering., , and . KSII Trans. Internet Inf. Syst., 10 (10): 4933-4956 (2016)FedAIoT: A Federated Learning Benchmark for Artificial Intelligence of Things., , , , , , , , , and 1 other author(s). CoRR, (2023)Modeling Personalized Out-of-Town Distances in Location Recommendation., , , , and . ICDM, page 112-121. IEEE, (2020)NELoRa: Towards Ultra-low SNR LoRa Communication with Neural-enhanced Demodulation., , , , , , , , , and . SenSys, page 56-68. ACM, (2021)Niche Product Retrieval in Top-N Recommendation., and . Web Intelligence, page 74-81. IEEE Computer Society, (2010)Privacy Risks of General-Purpose Language Models., , , and . SP, page 1314-1331. IEEE, (2020)