Author of the publication

Behavioral Malware Detection in Delay Tolerant Networks.

, , , and . IEEE Trans. Parallel Distributed Syst., 25 (1): 53-63 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An interval-coefficient fuzzy binary linear programming, the solution, and its application under uncertainties., and . JORS, 64 (10): 1557-1569 (2013)Assessing the Impact of Cascading Failures on the Interdomain Routing System of the Internet., , , and . New Generation Comput., 32 (3-4): 237-255 (2014)Surface Restructuring of Hybrid Perovskite Crystals, , , , , , , , , and 8 other author(s). ACS Energy Letters, 1 (6): 1119-1126 (2016)Identification of essential proteins via the network topology feature and subcellular localisation., , , , , , and . IJDMB, 16 (4): 328-344 (2016)Large-scale prediction of drug-target interactions from deep representations., , and . IJCNN, page 1236-1243. IEEE, (2016)Inversion symmetry and bulk Rashba effect in methylammonium lead iodide perovskite single crystals, , , , , , , , , and . Nature Communications, 9 (1): 1829-- (2018)Modeling and Electrical Simulations of Thin-Film Gated SOI Lateral PIN Photodetectors for High Sensitivity and Speed Performances., , , , and . NCCET, volume 396 of Communications in Computer and Information Science, page 235-243. Springer, (2013)Validity of a new designed constant workload cycle ergometer for assessing cardiopulmonary function., , , , and . CISP-BMEI, page 1-5. IEEE, (2017)Hierarchical Reinforcement Learning with Deep Nested Agents., and . CoRR, (2018)Time-Domain N-continuous GFDM.. CoRR, (2016)