From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Two-Stagse Approach for Social Identity Linkage Based on an Enhanced Weighted Graph Model., , , и . Mob. Networks Appl., 25 (4): 1364-1375 (2020)Three Birds With One Stone: User Intention Understanding and Influential Neighbor Disclosure for Injection Attack Detection., , и . IEEE Trans. Inf. Forensics Secur., (2022)MUCM: Multilevel User Cluster Mining Based on Behavior Profiles for Network Monitoring., , , и . IEEE Syst. J., 9 (4): 1322-1333 (2015)Progress in studies on automated generalization of spatial point cluster., , и . IGARSS, стр. 2841-2844. IEEE, (2004)High-quality tweet generation for online behavior security management based on semantics measurement., , , , и . Trans. Emerg. Telecommun. Technol., (2022)Symmetry Degree Measurement and its Applications to Anomaly Detection., , , , , и . IEEE Trans. Inf. Forensics Secur., (2020)Robust application identification methods for P2P and VoIP traffic classification in backbone networks., , , и . Knowl. Based Syst., (2015)Behavior spectrum: An effective method for user's web access behavior monitoring and measurement., , , и . GLOBECOM, стр. 961-966. IEEE, (2012)IIS: Intelligent Identification Scheme of Massive IoT Devices., , , , , и . COMPSAC, стр. 1623-1626. IEEE, (2021)DDoS Attack Detection Method using Entropy and Attention-based BiGRU., , и . HCCS, стр. 1-6. IEEE, (2023)