Author of the publication

Formal Characterization of Malicious Code in Power Information Systems Based on Multidimensional Feature Fusion.

, , , , and . ICCSIE, page 274-281. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deadlock-free genetic scheduling for flexible manufacturing systems using Petri nets and deadlock controllers, , , , and . International Journal of Production Research, 52 (5): 1557--1572 (Oct 29, 2013)3-D information of a space target retrieved from a sequence of high-resolution 2-D ISAR images., , and . IGARSS, page 5000-5002. IEEE, (2016)Cooperative Game Theory-Based Optimal Angular Momentum Management of Hybrid Attitude Control Actuator., , , , , , , and . IEEE Access, (2019)A group incremental approach for feature selection on hybrid data., , and . Soft Comput., 26 (8): 3663-3677 (2022)Self-supervised denoising for massive noisy images., , , and . CoRR, (2021)Deep reinforcement learning for multi-objective combinatorial optimization: A case study on multi-objective traveling salesman problem., , , and . Swarm Evol. Comput., (December 2023)A Survey from the Perspective of Evolutionary Process in the Internet of Things., , , and . Int. J. Distributed Sens. Networks, (2015)Transferring Face Verification Nets To Pain and Expression Regression., , , , , , , , and . CoRR, (2017)Frame Fusion with Vehicle Motion Prediction for 3D Object Detection., , , and . CoRR, (2023)FSD V2: Improving Fully Sparse 3D Object Detection with Virtual Voxels., , , and . CoRR, (2023)