Author of the publication

Fast Anomaly Detection in Multiple Multi-Dimensional Data Streams.

, , , , , , , and . IEEE BigData, page 1218-1223. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Product-line-based requirements customization for web service compositions., , and . SPLC, volume 446 of ACM International Conference Proceeding Series, page 141-150. ACM, (2009)Modeling and Understanding the Localization Performance With Network Signatures., , , and . IEEE Access, (2020)A New Improved Range Free Algorithm Based on DV-Hop in Wireless Sensor Network., , , , and . J. Commun., 10 (8): 589-595 (2015)Interpretability for reliable, efficient, and self-cognitive DNNs: From theories to applications., , , , , and . Neurocomputing, (2023)An Improved Network Traffic Classification Model Based on a Support Vector Machine., , , , , and . Symmetry, 12 (2): 301 (2020)Effective Focal Area Dimension Optimization of Shear Horizontal Point-Focusing EMAT Using Orthogonal Test Method., , , , , and . IEEE Trans. Instrum. Meas., (2021)Multi-Attention Generative Adversarial Network for Multivariate Time Series Prediction., , , , , and . IEEE Access, (2021)Facing COVID-19 in China and the US: Do we have the same emotions?, , and . BESC, page 1-6. IEEE, (2021)VDBWGDL: Vulnerability Detection Based On Weight Graph And Deep Learning., , , , , and . DSN Workshops, page 186-190. IEEE, (2022)A Review of Data Representation Methods for Vulnerability Mining Using Deep Learning., , , , , , , , and . FCS, volume 1558 of Communications in Computer and Information Science, page 342-351. Springer, (2021)