Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A survey of strategy-driven evasion methods for PE malware: Transformation, concealment, and attack., , , , , and . Comput. Secur., (February 2024)Evading Anti-Malware Engines With Deep Reinforcement Learning., , , , , and . IEEE Access, (2019)Network-Wide Anomaly Detection Based on Router Connection Relationships., and . IEICE Trans. Commun., 94-B (8): 2239-2242 (2011)Robust Traffic Prediction From Spatial-Temporal Data Based on Conditional Distribution Learning., , , , , , and . IEEE Trans. Cybern., 52 (12): 13458-13471 (2022)PD-FAC: Probability Density Factorized Multi-Agent Distributional Reinforcement Learning for Multi-Robot Reliable Search., , , and . IEEE Robotics Autom. Lett., 7 (4): 8869-8876 (2022)Illumination-insensitive Binary Descriptor for Visual Measurement Based on Local Inter-patch Invariance., , , , and . CoRR, (2023)Deep Anomaly Detection in Packet Payload., , , , , , and . CoRR, (2019)Subjective and Objective Quality Assessment for in-the-Wild Computer Graphics Images., , , , , , , and . ACM Trans. Multim. Comput. Commun. Appl., 20 (4): 96:1-96:22 (April 2024)Configurable 2-D Linear Feedback Shift Registers for VLSI Built-in Self-test Designs., and . VLSI Design, 11 (2): 149-159 (2000)Stochastic Bigger Subspace Algorithms for Nonconvex Stochastic Optimization., , , and . IEEE Access, (2021)