Author of the publication

Knowledge Mining in Cybersecurity: From Attack to Defense.

, , , , , and . DBSec, volume 13383 of Lecture Notes in Computer Science, page 110-122. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

M2FPA: A Multi-Yaw Multi-Pitch High-Quality Database and Benchmark for Facial Pose Analysis., , , , and . CoRR, (2019)CAPT: Contrastive Pre-Training based Semi-Supervised Open-Set Learning., , , , and . MIPR, page 7-13. IEEE, (2022)Geometry-Aware Face Completion and Editing., , , , and . AAAI, page 2506-2513. AAAI Press, (2019)CM-NAS: Cross-Modality Neural Architecture Search for Visible-Infrared Person Re-Identification., , , , , and . ICCV, page 11803-11812. IEEE, (2021)Using nonlinear sparse Bayesian learning model to identify the correlation between multiple clinical cognitive scores and neuroimaging measurements., , , , and . BIBM, page 2548-2553. IEEE, (2020)Global and Local Consistent Age Generative Adversarial Networks., , , , and . ICPR, page 1073-1078. IEEE Computer Society, (2018)A New Evolutionary Algorithm for Constrained Optimization Problems., and . CIS, page 105-109. IEEE Computer Society, (2007)Protecting Your Faces: MeshFaces Generation and Removal via High-Order Relation-Preserving CycleGAN., , , , and . ICB, page 61-68. IEEE, (2018)Better to Ask in English: Cross-Lingual Evaluation of Large Language Models for Healthcare Queries., , , , , and . WWW, page 2627-2638. ACM, (2024)UVA: A Universal Variational Framework for Continuous Age Analysis., , , , , and . CoRR, (2019)