Author of the publication

Hybrid Classification of WEB Trojan Exploiting Small Volume of Labeled Data Vectors.

, , , , and . CIS, page 286-290. IEEE Computer Society, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network Traffic Sampling System Based on Storage Compression for Application Classification Detection., , , , , and . IEEE Access, (2020)Two-Stage Mixed Queuing Model for Web Security Gateway Performance Evaluation., , , , , and . ICCCN, page 1-7. IEEE, (2017)Identification of unknown operating system type of Internet of Things terminal device based on RIPPER., , , , , and . IJDSN, (2018)Network Penetration Identification Method Based on Interactive Behavior Analysis., , , , , and . CBD, page 210-215. IEEE, (2019)User Credibility Assessment Based on Trust Propagation in Microblog., , , and . ComComAP, page 270-275. IEEE, (2019)User anchor link identification based on integrated similarity decision in multiple heterogeneous social networks., , and . ComComAP, page 438-443. IEEE, (2019)An incentive mechanism design for federated learning with multiple task publishers by contract theory approach., , , , , and . Inf. Sci., (2024)Location-Aware Targeted Influence Blocking Maximization in Social Networks., , , , , and . ICCCN, page 1-9. IEEE, (2019)A Webpage Deletion Algorithm Based on Hierarchical Filtering., , , and . WISM, volume 7529 of Lecture Notes in Computer Science, page 551-557. Springer, (2012)Hybrid Classification of WEB Trojan Exploiting Small Volume of Labeled Data Vectors., , , , and . CIS, page 286-290. IEEE Computer Society, (2018)