Author of the publication

STEAL: Service Time-Aware Load balancer on many-core processors for fast intrusion detection.

, , , and . INFOCOM Workshops, page 65-70. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EEJE: Two-Step Input Transformation for Robust DNN Against Adversarial Examples., , , and . IEEE Trans. Netw. Sci. Eng., 8 (2): 908-920 (2021)PIHA: Detection method using perceptual image hashing against query-based adversarial attacks., , and . Future Gener. Comput. Syst., (August 2023)Wireless intrusion prevention system using dynamic random forest against wireless MAC spoofing attack., , and . DSC, page 131-137. IEEE, (2017)STEAL: Service Time-Aware Load balancer on many-core processors for fast intrusion detection., , , and . INFOCOM Workshops, page 65-70. IEEE, (2016)Simple deterministic O(n log n) algorithm finding a solution of Erdős-Ginzburg-Ziv theorem., , and . CoRR, (2022)Robustness Analysis of CNN-based Malware Family Classification Methods Against Various Adversarial Attacks., , , and . CNS, page 1-6. IEEE, (2019)Robust Indoor Localization Methods Using Random Forest-Based Filter against MAC Spoofing Attack., , , and . Sensors, 20 (23): 6756 (2020)Memory-Efficient Random Forest Generation Method for Network Intrusion Detection., , , and . ICUFN, page 305-307. IEEE, (2018)Visual Analytics System of Comprehensive Data Quality Improvement for Machine Learning using Data- and Process-driven Strategies., , , , , , and . IEEE Big Data, page 396-401. IEEE, (2022)Timely login status control using mobile app., , and . CNS, page 743-744. IEEE, (2015)