Author of the publication

APTKG: Constructing Threat Intelligence Knowledge Graph from Open-Source APT Reports Based on Deep Learning.

, , , , and . DSIT, page 1-6. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A deep bidirectional LSTM approach for video-realistic talking head., , , , and . Multimedia Tools Appl., 75 (9): 5287-5309 (2016)Deformable object tracking with spatiotemporal segmentation in big vision surveillance., , , and . Neurocomputing, (2016)Optimal Accurate Minkowski Sum Approximation of Polyhedral Models., , and . ICIC (1), volume 5226 of Lecture Notes in Computer Science, page 179-188. Springer, (2008)Axial Compression Behaviours of Pultruded GFRP-Wood Composite Columns., , , , and . Sensors, 19 (4): 755 (2019)2D/3D Web Visualization on Mobile Devices., , , , and . WISE, volume 4255 of Lecture Notes in Computer Science, page 536-547. Springer, (2006)A tighter lower bound estimate for dynamic time warping., , , and . ICASSP, page 8525-8529. IEEE, (2013)A User-Preference-Aware Terminal-Controlled Access Network Selection Scheme in Heterogeneous Wireless Networks., , , and . VTC Fall, page 1-5. IEEE, (2013)Investigating neural network based query-by-example keyword spotting approach for personalized wake-up word detection in Mandarin Chinese., , and . ISCSLP, page 1-5. IEEE, (2016)Ergodic channel capacity analysis of the hybrid satellite-terrestrial single frequency network., , , and . PIMRC, page 1803-1807. IEEE, (2015)A segmental DNN/i-vector approach for digit-prompted speaker verification., , , and . APSIPA, page 1-5. IEEE, (2017)