Author of the publication

Collecting Internet Malware Based on Client-side Honeypot.

, , , , and . ICYCS, page 1493-1498. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Easily-add battery-free wireless sensors to everyday objects: system implementation and usability study., , , , , and . CCF Trans. Pervasive Comput. Interact., 4 (1): 45-60 (2022)TC-Flow: Chain Flow Scheduling for Advanced Industrial Applications in Time-Sensitive Networks., , , , , and . IEEE Netw., 36 (2): 16-24 (2022)Exploring the Impact of Negative Samples of Contrastive Learning: A Case Study of Sentence Embeddin., , , , , , and . CoRR, (2022)Superiority of Multi-Head Attention in In-Context Linear Regression., , , , and . CoRR, (2024)Second-order Anisotropic Gaussian Directional Derivative Filters for Blob Detection., , , , and . CoRR, (2023)A Game-Theoretic Taxonomy of Visual Concepts in DNNs., , , , and . CoRR, (2021)Dataset for Investigating Anomalies in Compute Clusters., , , , , , , , , and 1 other author(s). CoRR, (2023)Transferable Unlearnable Examples., , , , , and . CoRR, (2022)Generalized multiple strip packing problem: Formulations, applications, and solution algorithms., , , and . Comput. Ind. Eng., (2023)Limited text speech synthesis with electroglottograph based on Bi-LSTM and modified Tacotron-2., , , , and . Appl. Intell., 52 (13): 15193-15209 (2022)