Author of the publication

Immunity-Based Model for Malicious Code Detection.

, , , and . ICIC (1), volume 6215 of Lecture Notes in Computer Science, page 399-406. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A mass graph-based approach for the identification of modified proteoforms using top-down tandem mass spectra., , , , , and . Bioinform., 33 (9): 1309-1316 (2017)Performance analysis of Rayleigh fading ad hoc networks with regular topology., and . GLOBECOM, page 5. IEEE, (2005)Adversarial attack on human pose estimation network., , , , and . J. Electronic Imaging, (2024)A detection method of individual fare evasion behaviours on metros based on skeleton sequence and time series., , , , , , and . Inf. Sci., (2022)Evaluation of top-down mass spectral identification with homologous protein sequences., , , , , , , and . BMC Bioinform., 19-S (17): 21-28 (2018)Spectral probabilities of top-down tandem mass spectra., , , and . BMC Genom., 15 (S-1): S9 (2014)Two Improved Methods of Generating Adversarial Examples against Faster R-CNNs for Tram Environment Perception Systems., , , , and . Complex., (2020)An Attention-Guided and Wavelet-Constrained Generative Adversarial Network for Infrared and Visible Image Fusion., , , , and . CoRR, (2022)Adversarial attacks on YOLACT instance segmentation., , , , and . Comput. Secur., (2022)An improved ShapeShifter method of generating adversarial examples for physical attacks on stop signs against Faster R-CNNs., , , and . Comput. Secur., (2021)