Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unveiling shadows: A comprehensive framework for insider threat detection based on statistical and sequential analysis., , , , , and . Comput. Secur., (March 2024)Learning High-quality Proposals for Acne Detection., , , , , , and . CoRR, (2022)HLMD: Detecting Lateral Movement Using Heterogeneous Graph Model., , , , , , and . HPCC/DSS/SmartCity/DependSys, page 122-130. IEEE, (2023)Semantic Similarity Detection For Data Leak Prevention., , and . CISR, page 4:1-4:6. ACM, (2015)Long-Term Span Traffic Prediction Model Based on STL Decomposition and LSTM., , , , , and . APNOMS, page 1-4. IEEE, (2019)The Effect of Vowel Contexts on Voice Onset Time of Mandarin Word-Initial Stops., and . IALP, page 121-124. IEEE, (2020)Identifying Truly Suspicious Events and False Alarms Based on Alert Graph., , , , and . IEEE BigData, page 5929-5936. IEEE, (2019)WP-GBDT: An Approach for Winner Prediction using Gradient Boosting Decision Tree., , , and . IEEE BigData, page 5691-5698. IEEE, (2021)An Approach for Predicting the Costs of Forwarding Contracts using Gradient Boosting., , , and . FedCSIS, volume 30 of Annals of Computer Science and Information Systems, page 451-454. (2022)Revealing the Mechanism of SARS-CoV-2 Spike Protein Binding With ACE2., , , , , , , , , and . Comput. Sci. Eng., 22 (6): 21-29 (2020)