Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Decoding Polar Codes via Weighted-Window Soft Cancellation for Slowly-Varying Channel.. CoRR, (2019)Long-term 3D Registration Method Based on LCT Tracking and Improved ORB Detection., , , , and . APSIPA, page 1370-1379. IEEE, (2019)DDIML: Explainable detection model for drive-by-download attacks., , and . J. Intell. Fuzzy Syst., 43 (3): 3429-3442 (2022)Semi-Supervised Malware Clustering Based on the Weight of Bytecode and API., , , , and . IEEE Access, (2020)A Multifactorial Framework for Short-Term Load Forecasting System as Well as the Jinan's Case Study., , , and . IEEE Access, (2020)Periodic and Almost Periodic Solutions of Stochastic Inertial Bidirectional Associative Memory Neural Networks on Time Scales., , , and . Axioms, 12 (6): 574 (June 2023)The Darboux Transformation and N-Soliton Solutions of Gerdjikov-Ivanov Equation on a Time-Space Scale., , , , and . Axioms, 10 (4): 294 (2021)A parallel sliding-window belief propagation algorithm for Q-ary LDPC codes accelerated by GPU., , and . Multim. Tools Appl., 79 (45-46): 34287-34300 (2020)PWAGAT: Potential Web attacker detection based on graph attention network., , , and . Neurocomputing, (November 2023)LMTracker: Lateral movement path detection based on heterogeneous graph embedding., , , and . Neurocomputing, (2022)