Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network abnormal traffic detection method based on fusion of chord similarity and multiple loss encoder., , , , and . EURASIP J. Wirel. Commun. Netw., 2022 (1): 105 (2022)A Feedback Semi-Supervised Learning With Meta-Gradient for Intrusion Detection., , and . IEEE Syst. J., 17 (1): 1158-1169 (March 2023)Low-Latency Dimensional Expansion and Anomaly Detection Empowered Secure IoT Network., , , , , and . IEEE Trans. Netw. Serv. Manag., 20 (3): 3865-3879 (September 2023)Knowledge reasoning with multiple relational paths., , and . Connect. Sci., (December 2023)Fabric-GC: A Blockchain-based Gantt Chart System for Cross-organizational Project Management., , , , , and . CoRR, (2022)Bidirectional Semi-supervised Dual-branch CNN for Robust 3D Reconstruction of Stereo Endoscopic Images via Adaptive Cross and Parallel Supervisions., , , , , and . CoRR, (2022)CTDM: cryptocurrency abnormal transaction detection method with spatio-temporal and global representation., , , , , , and . Soft Comput., 27 (16): 11647-11660 (August 2023)A Fuzzy MEBN Ontology Language Based on OWL2., , , , and . FSDM, volume 293 of Frontiers in Artificial Intelligence and Applications, page 71-80. IOS Press, (2016)Unsupervised Fake News Detection Based on Autoencoder., , , and . IEEE Access, (2021)A Blockchain-Based Auditable Access Control System for Private Data in Service-Centric IoT Environments., , , , , and . IEEE Trans. Ind. Informatics, 18 (5): 3530-3540 (2022)