From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Real-Valued Negative Selection Algorithm with Variable-Sized Self Radius., , , , и . ICICA (LNCS), том 7473 из Lecture Notes in Computer Science, стр. 229-235. Springer, (2012)A Supervised Classifier Based on Artificial Immune System., , , , , , и . International Conference on Computational Science (2), том 4488 из Lecture Notes in Computer Science, стр. 355-362. Springer, (2007)A Computer Forensics Model Based On Danger Theory., , , , , и . IITA, стр. 87-90. IEEE Computer Society, (2007)Negative Selection Algorithm Based Unknown Malware Detection Model., и . BIC-TA, том 562 из Communications in Computer and Information Science, стр. 598-608. Springer, (2015)A novel intrusion detection approach learned from the change of antibody concentration in biological immune response., , , , , и . Appl. Intell., 35 (1): 41-62 (2011)Efficient Detect Scheme of Botnet Command and Control Communication., , , , и . ICICA (1), том 307 из Communications in Computer and Information Science, стр. 576-581. Springer, (2012)A Feedback Negative Selection Algorithm to Anomaly Detection., , , , , и . ICNC (3), стр. 604-608. IEEE Computer Society, (2007)Divide and Conquer: Subset Matching for Scene Graph Generation in Complex Scenes., , и . IEEE Access, (2022)Artificial Immunity-Based Discovery for Popular Information in WEB Pages., , , , , и . International Conference on Computational Science (4), том 4490 из Lecture Notes in Computer Science, стр. 166-169. Springer, (2007)YOLO-Xweld: Efficiently Detecting Pipeline Welding Defects in X-Ray Images for Constrained Environments., , , и . IJCNN, стр. 1-7. IEEE, (2022)