Author of the publication

An trustworthy intrusion detection framework enabled by ex-post-interpretation-enabled approach.

, , , , , , , , , , , and . J. Inf. Secur. Appl., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CA-CSM: a novel clustering algorithm based on cluster center selection model., , , , , and . Soft Comput., 25 (13): 8015-8033 (2021)A Single-Inverter-Based True Random Number Generator with On-Chip Clock-Tuning-Based Entropy Calibration Circuit., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 107 (1): 105-113 (January 2024)EEG analysis of Parkinson's disease using time-frequency analysis and deep learning., , and . Biomed. Signal Process. Control., (2022)A 0.186-pJ per Bit Latch-Based True Random Number Generator with Mismatch Compensation and Random Noise Enhancement., , , , , , and . VLSI Circuits, page 1-2. IEEE, (2021)High-throughput Von Neumann post-processing for random number generator., , , and . VLSI-DAT, page 1-4. IEEE, (2018)Practical Markov Chain and Von Neumann based Post-processing Circuits for True Random Number Generators., , , , , and . MWSCAS, page 841-845. IEEE, (2023)Who are influential in Q&A communities? A measure of V-Constraint based on knowledge diffusion capability., , , , and . J. Inf. Sci., (2019)How does knowledge heterogeneity affect transactive memory system in innovation? Evidence from a field study., , and . J. Knowl. Manag., 24 (8): 1965-1985 (2020)A fitting algorithm based on multi-touch gesture for rapid generation of railway line., , , , , , and . Integr. Comput. Aided Eng., 30 (2): 135-150 (2023)Lightweight Dual-Task Networks For Crowd Counting In Aerial Images., , , , and . ICASSP, page 1975-1979. IEEE, (2021)