Author of the publication

TR-IDS: Anomaly-Based Intrusion Detection through Text-Convolutional Neural Network and Random Forest.

, , , , and . Secur. Commun. Networks, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of the Variance Reduction in SVRG and a New Acceleration Method., , and . IEEE Access, (2018)Transformer for Graphs: An Overview from Architecture Perspective., , , , , , , , , and . CoRR, (2022)同态加密在加密机器学习中的应用研究综述 (Survey on Application of Homomorphic Encryption in Encrypted Machine Learning)., , , , and . 计算机科学, 45 (4): 46-52 (2018)Scenario-Adaptive Feature Interaction for Click-Through Rate Prediction., , , , and . KDD, page 4661-4672. ACM, (2023)WEDL-NIDS: Improving Network Intrusion Detection Using Word Embedding-Based Deep Learning Method., , , and . MDAI, volume 11144 of Lecture Notes in Computer Science, page 283-295. Springer, (2018)Neighbour Interaction based Click-Through Rate Prediction via Graph-masked Transformer., , , , , , , , and . SIGIR, page 353-362. ACM, (2022)A Survey of Clustering With Deep Learning: From the Perspective of Network Architecture., , , , , and . IEEE Access, (2018)Variance Reduced Stochastic Optimization for PCA and PLS., , and . ISCID (1), page 383-388. IEEE, (2017)Masked Transformer for Neighhourhood-aware Click-Through Rate Prediction., , , , , , , , and . CoRR, (2022)Divide-and-Conquer: Post-User Interaction Network for Fake News Detection on Social Media., , , , , , and . WWW, page 1148-1158. ACM, (2022)