Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Validation and Comparison of Seven Land Surface Evapotranspiration Products in the Haihe River Basin, China., , , and . Remote. Sens., 14 (17): 4308 (2022)Attack detection based on machine learning algorithms for different variants of Spectre attacks and different Meltdown attack implementations., , , , and . CoRR, (2022)Coreference Resolution with Syntax and Semantics., , , , , and . WISA, volume 13579 of Lecture Notes in Computer Science, page 181-193. Springer, (2022)Towards Heap-Based Memory Corruption Discovery., , , and . MSN, page 502-511. IEEE, (2021)DeepHunter: A Graph Neural Network Based Approach for Robust Cyber Threat Hunting., , , , and . SecureComm (1), volume 398 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 3-24. Springer, (2021)AttackMiner: A Graph Neural Network Based Approach for Attack Detection from Audit Logs., , , , , , and . SecureComm, volume 462 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 510-528. Springer, (2022)Distributed Randomized Sketching Kernel Learning., , and . AAAI, page 8883-8891. AAAI Press, (2022)Determine the Hardware Choice to Improve HDFS Performance Deployed in a Commodity Cluster., , , , , and . CSE, page 1295-1302. IEEE Computer Society, (2013)An Interactive Intelligent Search Engine Model Research Based on User Information Preference., and . JCIS, Atlantis Press, (2006)MAMS: A Highly Reliable Policy for Metadata Service., , , and . ICPP, page 729-738. IEEE Computer Society, (2015)