Author of the publication

Applications of Fuzzy Data Mining Methods for Intrusion Detection Systems.

, , and . ICCSA (3), volume 3045 of Lecture Notes in Computer Science, page 706-714. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Knowledge-Enhanced Pretraining Model for Commonsense Story Generation., , , , and . CoRR, (2020)LOT: A Benchmark for Evaluating Chinese Long Text Understanding and Generation., , , , , , and . CoRR, (2021)WRGPruner: A new model pruning solution for tiny salient object detection., , , , , and . Image Vis. Comput., (2021)Micro-Motion Classification of Flying Bird and Rotor Drones via Data Augmentation and Modified Multi-Scale CNN., , , , , and . Remote. Sens., 14 (5): 1107 (2022)CUGE: A Chinese Language Understanding and Generation Evaluation Benchmark., , , , , , , , , and 25 other author(s). CoRR, (2021)A Benchmark for Understanding and Generating Dialogue between Characters in Stories., , , and . CoRR, (2022)Unsupervised domain adaptive tumor region recognition for Ki67 automated assisted quantification., , , , , , , , , and 1 other author(s). Int. J. Comput. Assist. Radiol. Surg., 18 (4): 629-640 (April 2023)Learning Common and Task-Specific Radiomic Features via Graph Regularized NMF for the Joint Prediction of Multiple Clinical Indicators in Breast Cancer., , , and . IEEE J. Biomed. Health Informatics, 27 (10): 4792-4803 (October 2023)Adults still can't resist: A social robot can induce normative conformity., , , , , , , , and . Comput. Hum. Behav., (2022)One deep learning local-global model based on CT imaging to differentiate between nodular cryptococcosis and lung cancer which are hard to be diagnosed., , , , , , , , and . Comput. Medical Imaging Graph., (2021)