Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research Notes: User Identification Model Based on Mouse Behaviors., , , , and . International Journal of Software Engineering and Knowledge Engineering, 28 (2): 175-192 (2018)A Recommendation System Based on Regression Model of Three-Tier Network Architecture., , , and . IJDSN, (2016)Dynamic Adjusting ABC-SVM Anomaly Detection Based on Weighted Function Code Correlation., , , , , and . ML4CS (1), volume 12486 of Lecture Notes in Computer Science, page 1-11. Springer, (2020)Process-Oriented heterogeneous graph learning in GNN-Based ICS anomalous pattern recognition., , , and . Pattern Recognit., (September 2023)Contrastive graph neural network-based camouflaged fraud detector., , , , and . Inf. Sci., (2022)AAE-DSVDD: A one-class classification model for VPN traffic identification., , , , , and . Comput. Networks, (November 2023)A proactive discovery and filtering solution on phishing websites., , , , and . IEEE BigData, page 2348-2355. IEEE Computer Society, (2015)A Worm Behavioral Approach to Susceptible Host Detection., , and . GCC, volume 3795 of Lecture Notes in Computer Science, page 77-83. Springer, (2005)An Interactive Traffic Replay Method in a Scaled-Down Environment., , , and . IEEE Access, (2019)Anomaly Detection for Industrial Control System Based on Autoencoder Neural Network., , , and . Wirel. Commun. Mob. Comput., (2020)