Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LOLWTC: A Deep Learning Approach for Detecting Living Off the Land Attacks., , , and . CCIS, page 176-181. IEEE, (2023)The Design of a Cloud Forensics Middleware System Base on Memory Analysis., , , , and . SoCPaR, volume 942 of Advances in Intelligent Systems and Computing, page 258-267. Springer, (2018)A Video Watermarking Scheme Based on Multi-Algorithm Selection., , , and . IIH-MSP, page 252-255. IEEE, (2012)A real-time small target detection network., , , and . Signal Image Video Process., 15 (6): 1265-1273 (2021)Review of intelligent video surveillance technology research., , , , and . EMEIT, page 230-233. IEEE, (2011)Cx22: A new publicly available dataset for deep learning-based segmentation of cervical cytology images., , , , , and . Comput. Biol. Medicine, (2022)Video forensics research based on authenticity and integrity., , , , and . ICIA, page 1223-1226. IEEE, (2016)Linking social network accounts by modeling user spatiotemporal habits., , , , and . ISI, page 19-24. IEEE, (2017)Sequential Multi-task Learning with Task Dependency for Appeal Judgment Prediction., , , , , and . CoRR, (2022)Recognizing roles of online illegal gambling participants: An ensemble learning approach., , , , and . Comput. Secur., (2019)