Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Spatial Sampling Strategies for the Effect of Interpolation Accuracy., , , and . ISPRS Int. J. Geo Inf., 4 (4): 2742-2768 (2015)Effects of Lucc Resulting From Tffp Land Usepattern in the Yellow River Delta, China., , , , , , and . CCTA (1), volume 293 of IFIP Advances in Information and Communication Technology, page 431-441. Springer, (2008)Remote Attestation on Behavioral Traces for Crowd Quality Control Based on Trusted Platform Module., and . Secur. Commun. Networks, (2021)Malware detection method based on image analysis and generative adversarial networks., , , , and . Concurr. Comput. Pract. Exp., (2022)Semi-supervised machine learning framework for network intrusion detection., , , and . J. Supercomput., 78 (11): 13122-13144 (2022)Network intrusion detection via tri-broad learning system based on spatial-temporal granularity., , , and . J. Supercomput., 79 (8): 9180-9205 (May 2023)A Reliability Prediction Method for Power Communication Network Based on Node Importance., , , , , , and . ICSAI, page 1-6. IEEE, (2023)A Research and Application of Continuous Attributes Discretization Based on Cloud Model and Information Entropy., , , , and . FSKD (3), page 34-38. IEEE Computer Society, (2009)A Comprehensive Assessment Method of Asset Importance for Key Asset Protection., , , and . ICCNS, page 79-83. ACM, (2019)Research on Intrusion Detection Method Based on Improved Smote and XGBoost., , and . ICCNS, page 37-41. ACM, (2018)