Author of the publication

A novel transfer extreme learning machine from multiple sources for intrusion detection.

, , and . Peer Peer Netw. Appl., 17 (1): 33-47 (January 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mutual prediction learning and mixed viewpoints for unsupervised-domain adaptation person re-identification on blockchain., , , , and . Simul. Model. Pract. Theory, (2022)Subfield Attacks on HSVP in Ideal Lattices., , , and . Inscrypt, volume 13837 of Lecture Notes in Computer Science, page 447-462. Springer, (2022)Verifiable Decryption for Fully Homomorphic Encryption., and . ISC, volume 11060 of Lecture Notes in Computer Science, page 347-365. Springer, (2018)Fully homomorphic encryption based on the ring learning with rounding problem., , , and . IET Inf. Secur., 13 (6): 639-648 (2019)3-D Particle Surface Reconstruction From Multiview 2-D Images With Structure From Motion and Shape From Shading (January 2020)., , , , , and . IEEE Trans. Ind. Electron., 68 (2): 1626-1635 (2021)A Robust Space Target Detection Algorithm Based on Target Characteristics., , , , , and . IEEE Geosci. Remote. Sens. Lett., (2022)Co-teaching based pseudo label refinery for cross-domain object detection., , , , and . IET Image Process., 15 (13): 3189-3199 (2021)Ferrograph Analysis With Improved Particle Segmentation and Classification Methods., , , and . J. Comput. Inf. Sci. Eng., (2020)ConGNN: Context-consistent cross-graph neural network for group emotion recognition in the wild., , , , , and . Inf. Sci., (2022)Hybrid Dual and Meet-LWE Attack., , , and . ACISP, volume 13494 of Lecture Notes in Computer Science, page 168-188. Springer, (2022)