Search

Your search keyword '"Kangfeng Zheng"' showing total 187 results

Search Constraints

Start Over You searched for: Author "Kangfeng Zheng" Remove constraint Author: "Kangfeng Zheng"
187 results on '"Kangfeng Zheng"'

Search Results

1. FedKG: A Knowledge Distillation-Based Federated Graph Method for Social Bot Detection

2. An Investigation of the Behaviors and Characteristics of the Interfacial Bonding Capacity between Cement Emulsified Asphalt Composite Binder and Reclaimed Asphalt Pavement

3. AATMS: An Anti-Attack Trust Management Scheme in VANET

4. An Explainable Machine Learning Framework for Intrusion Detection Systems

5. Using Improved Conditional Generative Adversarial Networks to Detect Social Bots on Twitter

6. Network Intrusion Detection Based on Supervised Adversarial Variational Auto-Encoder With Regularization

7. Survey of research on application of heuristic algorithm in machine learning

8. CBA-CLSVE: A Class-Level Soft-Voting Ensemble Based on the Chaos Bat Algorithm for Intrusion Detection

9. User Authentication Method Based on Keystroke Dynamics and Mouse Dynamics with Scene-Irrelated Features in Hybrid Scenes

10. Improving Reliability: User Authentication on Smartphones Using Keystroke Biometrics

11. A Session and Dialogue-Based Social Engineering Framework

12. Efficient Strategy Selection for Moving Target Defense Under Multiple Attacks

13. SMOTETomek-Based Resampling for Personality Recognition

14. Elastic Switch Migration for Control Plane Load Balancing in SDN

15. Phishing Website Detection Based on Deep Convolutional Neural Network and Random Forest Ensemble Learning

16. Personality Classification of Social Users Based on Feature Fusion

17. Detecting Social Media Bots with Variational AutoEncoder and k-Nearest Neighbor

18. Graph Adaptation Network with Domain-Specific Word Alignment for Cross-Domain Relation Extraction

19. Hierarchical Transformer Network for Utterance-Level Emotion Recognition

20. Fuzzy–synthetic minority oversampling technique: Oversampling based on fuzzy set theory for Android malware detection in imbalanced datasets

21. Improving the Classification Effectiveness of Intrusion Detection by Using Improved Conditional Variational AutoEncoder and Deep Neural Network

22. Building an Effective Intrusion Detection System Using the Modified Density Peak Clustering Algorithm and Deep Belief Networks

23. ACO-BTM: A Behavior Trust Model in Cloud Computing Environment

25. Efficient User Identity Linkage Based on Aligned Multimodal Features and Temporal Correlation.

38. C2Net-YOLOv5: A Bidirectional Res2Net-Based Traffic Sign Detection Algorithm.

41. Prediction of Phishing Susceptibility Based on a Combination of Static and Dynamic Features

42. Social Engineering Attack-Defense Strategies Based on Reinforcement Learning.

43. Supervised Character Resemble Substitution Personality Adversarial Method

Catalog

Books, media, physical & digital resources