From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Attack pattern mining algorithm based on security log., , , , и . ISI, стр. 205. IEEE, (2017)An Android malware detection method based on AndroidManifest file., , , , и . CCIS, стр. 239-243. IEEE, (2016)Phishing sites detection based on Url Correlation., , , , , и . CCIS, стр. 244-248. IEEE, (2016)An attack pattern mining algorithm based on fuzzy logic and sequence pattern., , , , , и . CCIS, стр. 234-238. IEEE, (2016)A web page malicious script detection system., , , , , и . CCIS, стр. 394-399. IEEE, (2014)A Robust Deepfake Video Detection Method based on Continuous Frame Face-swapping., , , и . AIIPCC, стр. 188-191. IEEE, (2022)Multi-risk Aware Trajectory Planning for Car-like Robot in Highly Dynamic Environments., , , , , и . ITSC, стр. 4709-4716. IEEE, (2023)Fast spatio-temporal decorrelation using FIR filter network with decoupled adaptive step sizes., , и . Digit. Signal Process., (2020)Defense Strategy of Network Security based on Dynamic Classification., , , , и . KSII Trans. Internet Inf. Syst., 9 (12): 5116-5134 (2015)Affine iterative closest point algorithm for point set registration., , , и . Pattern Recognit. Lett., 31 (9): 791-799 (2010)