Author of the publication

An trustworthy intrusion detection framework enabled by ex-post-interpretation-enabled approach.

, , , , , , , , , , , and . J. Inf. Secur. Appl., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PTM: A Topic Model for the Inferring of the Penalty., , , , and . J. Comput. Sci. Technol., 33 (4): 756-767 (2018)Mining Sequential Patterns of Predicates for Fault Localization and Understanding., , , and . SERE, page 109-118. IEEE, (2013)Using Weighted Attributes to Improve Cluster Test Selection., , , , and . SERE, page 138-146. IEEE, (2012)Software Engineering Practice in the Development of Deep Learning Applications., , , and . CoRR, (2019)Predicting Passengers in Public Transportation Using Smart Card Data., , , , , and . ADC, volume 9093 of Lecture Notes in Computer Science, page 28-40. Springer, (2015)ABEY: an Incremental Personalized Method Based on Attribute Entropy for Recommender Systems (S)., , , , and . SEKE, page 318-321. Knowledge Systems Institute Graduate School, (2013)Identifying Coincidental Correctness for Fault Localization by Clustering Test Cases., , , , and . SEKE, page 267-272. Knowledge Systems Institute Graduate School, (2012)Optimization of the simultaneous pickup and delivery vehicle routing problem based on carbon tax., , , and . Ind. Manag. Data Syst., 119 (9): 2055-2071 (2019)Dilated Convolution-based Feature Refinement Network for Crowd Localization., , , , , and . ACM Trans. Multim. Comput. Commun. Appl., 19 (6): 217:1-217:16 (November 2023)A particle swarm inspired multi-elitist artificial bee colony algorithm for real-parameter optimization., , , , , and . Comput. Optim. Appl., 57 (2): 493-516 (2014)