Author of the publication

A novel tensor-information bottleneck method for multi-input single-output applications.

, , , , , and . Comput. Networks, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

O-ADPI: Online Adaptive Deep-Packet Inspector Using Mahalanobis Distance Map for Web Service Attacks Classification., , , , and . IEEE Access, (2019)Virtual resource allocation for heterogeneous services in full duplex-enabled small cell networks with cache and MEC., , , , and . INFOCOM Workshops, page 163-168. IEEE, (2017)Joint Resource Allocation in Cache-Enabled Small Cell Networks with Massive MIMO and Full Duplex., , , , and . GLOBECOM, page 1-6. IEEE, (2017)Enhancing Big Data Security with Collaborative Intrusion Detection., , , , , , and . IEEE Cloud Comput., 1 (3): 27-33 (2014)On Privacy Aware Carriers for Value-Possessed e-Invoices Considering Intelligence Mining., , , , , and . IEEE Trans. Emerg. Top. Comput. Intell., 4 (5): 641-652 (2020)RePIDS: A multi tier Real-time Payload-based Intrusion Detection System., , , , and . Comput. Networks, 57 (3): 811-824 (2013)Toward machine intelligence that learns to fingerprint polymorphic worms in IoT., , , , , and . Int. J. Intell. Syst., 37 (10): 7058-7078 (2022)Block-Sparse Coding-Based Machine Learning Approach for Dependable Device-Free Localization in IoT Environment., , , , , , and . IEEE Internet Things J., 8 (5): 3211-3223 (2021)Detection of Denial-of-Service Attacks Based on Computer Vision Techniques., , , , , and . IEEE Trans. Computers, 64 (9): 2519-2533 (2015)scCancer2: data-driven in-depth annotations of the tumor microenvironment at single-level resolution., , , , , , , and . Bioinform., (February 2024)