Author of the publication

Network Security Situation Evaluation Strategy Based on Cloud Gravity Center Judgment.

, , , , and . J. Networks, 9 (2): 283-290 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Fuzzy Support Vector Machine-Enhanced Convolutional Neural Network for Recognition of Glass Defects., , , , and . Int. J. Fuzzy Syst., 21 (6): 1870-1881 (2019)Compressive tracking combined with sample weights and adaptive learning factor., , , , and . Concurr. Comput. Pract. Exp., (2018)Sato: Contextual Semantic Type Detection in Tables., , , , , and . CoRR, (2019)Multi-modal dimensionality reduction using effective distance., , and . Neurocomputing, (2017)CSCW-based JIT Purchasing Management., , , , , and . CSCWD, page 165-170. IEEE, (2006)Design of T-type three-level energy storage inverter and grid-connected control strategy., , , , , and . IECON, page 1072-1076. IEEE, (2017)How networked brain changes when working memory load reaches the capacity?, and . NER, page 980-983. IEEE, (2015)Motor imagery based brain-computer interface: A study of the effect of positive and negative feedback., , , , and . EMBC, page 6323-6326. IEEE, (2011)Illumination invariant face recognition based on the new phase features., , , and . SMC, page 3909-3914. IEEE, (2010)Efficient and robust feature extraction and selection for traffic classification., , , , and . Comput. Networks, (2017)