Author of the publication

An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning.

, , , , , and . Secur. Commun. Networks, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-factor combination authentication using fuzzy graph domination model., , , , and . J. Intell. Fuzzy Syst., 37 (4): 4979-4985 (2019)A Dynamic Parallel Meshless Method for the Problems with Large-Scale Movable and Deformable Boundary., , , , , , , , , and . J. Inf. Sci. Eng., 37 (1): 79-92 (2021)Blockchain-based deduplication with arbitration and incentives., , , , , and . IET Inf. Secur., 16 (6): 401-416 (2022)BBDS: Blockchain-Based Data Sharing for Electronic Medical Records in Cloud Environments., , , , and . Inf., 8 (2): 44 (2017)The convergence and termination criterion of quantum-inspired evolutionary neural networks., , , , and . Neurocomputing, (2017)Information Leakage in Encrypted Deduplication via Frequency Analysis: Attacks and Defenses., , , , and . CoRR, (2019)Generative Multimodal Models are In-Context Learners., , , , , , , , , and 1 other author(s). CoRR, (2023)An I/O Efficient Approach for Detecting All Accepting Cycles., , , , , and . IEEE Trans. Software Eng., 41 (8): 730-744 (2015)Adversarial Samples on Android Malware Detection Systems for IoT Systems., , , , and . CoRR, (2019)Defending Data Poisoning Attack via Trusted Platform Module and Blockchain Oracle., , , , and . ICC, page 1245-1250. IEEE, (2022)