Author of the publication

Multifeature Named Entity Recognition in Information Security Based on Adversarial Learning.

, , and . Secur. Commun. Networks, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generalized Cluster Aggregation., , and . IJCAI, page 1279-1284. (2009)Behavior switching using reservoir computing for a soft robotic arm., , , , and . ICRA, page 4918-4924. IEEE, (2012)Low Resolution 3D Reconstructions of Viruses from X-Ray Crystal Diffraction Data., , , and . ICIP (3), page 358-360. IEEE Computer Society, (1998)Healthcare Service Management - A Data-Driven Systems Approach, and . Springer, (2019)An Immune-Based Model for Service Survivability., , , , , and . CANS, volume 4301 of Lecture Notes in Computer Science, page 354-363. Springer, (2006)PerGrab: Adapting Grabbing Gesture Recognition for Personalized Non-contact HCI., and . IScIDE, volume 8261 of Lecture Notes in Computer Science, page 740-747. Springer, (2013)One memory access bloom filters and their generalization., , and . INFOCOM, page 1745-1753. IEEE, (2011)SESS: A security-enhanced secret storage scheme for password managers., , , and . WCSP, page 1-5. IEEE, (2015)Research on Logging Evaluation of Reservoir Contamination Based on PSO-BP Neural Network., , , , , , and . ISNN (2), volume 5552 of Lecture Notes in Computer Science, page 839-844. Springer, (2009)Distributed Consensus With Limited Communication Data Rate., , , and . IEEE Trans. Automat. Contr., 56 (2): 279-292 (2011)