Author of the publication

A Densely Stacked Attention Method for Cyberattack Detection.

, , , and . J. Inf. Sci. Eng., 39 (4): 935-950 (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Design of Immersion Acrophobia Adjuvant Therapy System (IAATS)., , , and . IFTC, volume 1009 of Communications in Computer and Information Science, page 447-455. Springer, (2018)An Intrusion Detection Method for Cyber Monintoring Using Attention based Hierarchical LSTM., , , and . BigDataSecurity/HPSC/IDS, page 125-130. IEEE, (2022)Chinese Morphological Analysis Using Morpheme and Character Features., , , , and . PRICAI, volume 7458 of Lecture Notes in Computer Science, page 866-869. Springer, (2012)Auditing Between Event Logs and Process Trees., , , and . IFTC, volume 1009 of Communications in Computer and Information Science, page 227-237. Springer, (2018)Machine Learning and Deep Learning Methods for Cybersecurity., , , , , , , , and . IEEE Access, (2018)A Densely Stacked Attention Method for Cyberattack Detection., , , and . J. Inf. Sci. Eng., 39 (4): 935-950 (2023)Design of Online Annotation and Incision System for IVUS Images., , , , and . IFTC, volume 1009 of Communications in Computer and Information Science, page 74-90. Springer, (2018)Intrusion Detection Based on Fusing Deep Neural Networks and Transfer Learning., , , , , , , and . IFTC, volume 1181 of Communications in Computer and Information Science, page 212-223. Springer, (2019)