Author of the publication

DB-Kmeans: An Intrusion Detection Algorithm Based on DBSCAN and K-means.

, , , , , and . APNOMS, page 1-4. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mobile edge computing resource allocation: A joint Stackelberg game and matching strategy., , , , and . Int. J. Distributed Sens. Networks, (2019)Master-slave Blockchain Based Cross-domain Trust Access Mechanism for UPIOT., , , , and . ICCCS, page 498-503. IEEE, (2020)Traffic Anomaly Detection for Data Communication Networks., , , , and . ICAIS (2), volume 12240 of Lecture Notes in Computer Science, page 440-450. Springer, (2020)Geographic Clustering Based Mobile Edge Computing Resource Allocation Optimization Mechanism., , , , and . CNSM, page 1-5. IEEE, (2019)Novel overlapping subgraph clustering for the detection of antigen epitopes., , , , , and . Bioinform., 34 (12): 2061-2068 (2018)DB-Kmeans: An Intrusion Detection Algorithm Based on DBSCAN and K-means., , , , , and . APNOMS, page 1-4. IEEE, (2019)An Energy-Efficient VNE Algorithm Based on Bidirectional Long Short-Term Memory., , , , , and . J. Netw. Syst. Manag., 30 (3): 45 (2022)TeaNet: Deep learning on Near-Infrared Spectroscopy (NIR) data for the assurance of tea quality., , , , , , , , , and . Comput. Electron. Agric., (2021)Research on design and optimization of shared data privacy protection scheme based on multi-party security computing., , , , and . ICISCAE, page 306-309. IEEE, (2023)Network intrusion detection based on Contractive Sparse Stacked Denoising Autoencoder., , , , , and . BMSB, page 1-6. IEEE, (2021)