Author of the publication

HELAD: A novel network anomaly detection model based on heterogeneous ensemble learning.

, , , , , , , , , and . Comput. Networks, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network protocol system monitoring: a formal approach with passive testing., , , , , and . IEEE/ACM Trans. Netw., 14 (2): 424-437 (2006)Sectional anatomic study on otorhinolaryngology structures., , , , , and . CARS, volume 1268 of International Congress Series, page 1302. Elsevier, (2004)Can Longest Prefix Matching Make The Path Length Shorter?, , , and . JDCTA, 4 (8): 172-181 (2010)Inter-domain routing bottlenecks and their aggravation., , , , , , and . Comput. Networks, (2019)基于增量最短路径优先的域内高效路由保护算法 (Efficient Intra-domain Routing Protection Algorithm Based on i-SPF)., and . 计算机科学, 46 (8): 116-120 (2019)A Survey on Network Verification and Testing With Formal Methods: Approaches and Challenges., , , , , , , and . IEEE Commun. Surv. Tutorials, 21 (1): 940-969 (2019)Traffic Engineering in Hybrid Software Defined Network via Reinforcement Learning., , , , , , , and . J. Netw. Comput. Appl., (2021)THREATRACE: Detecting and Tracing Host-Based Threats in Node Level Through Provenance Graph Learning., , , , , , , , and . IEEE Trans. Inf. Forensics Secur., (2022)Log-Based Anomaly Detection With Robust Feature Extraction and Online Learning., , , , , , , and . IEEE Trans. Inf. Forensics Secur., (2021)A hybrid link protection scheme for ensuring network service availability in link-state routing networks., , , , , , , and . J. Commun. Networks, 22 (1): 46-60 (2020)