259 results on '"Sun, Degang"'
Search Results
2. PromptSAM+: Malware Detection based on Prompt Segment Anything Model
3. Mitigating the Impact of Malware Evolution on API Sequence-based Windows Malware Detector
4. ASGNet: Adaptive Semantic Gate Networks for Log-Based Anomaly Diagnosis
5. Kairos: Practical Intrusion Detection and Investigation using Whole-system Provenance
6. DSGN: Log-based anomaly diagnosis with dynamic semantic gate networks
7. On eliminating blocking interference of RFID unauthorized reader detection system
8. DualAttlog: Context aware dual attention networks for log-based anomaly detection
9. Hierarchical Graph Convolutional Skeleton Transformer for Action Recognition
10. ASGNet: Adaptive Semantic Gate Networks for Log-Based Anomaly Diagnosis
11. Rethinking the Misalignment Problem in Dense Object Detection
12. Objects as Extreme Points
13. Rethinking the Misalignment Problem in Dense Object Detection
14. Building an “Outer Space Silk Road”
15. Rethinking the Misalignment Problem in Dense Object Detection
16. ITAR: A Method for Indoor RFID Trajectory Automatic Recovery
17. R-TDBF: An Environmental Adaptive Method for RFID Redundant Data Filtering
18. On Eliminating Blocking Interference of RFID Unauthorized Reader Detection
19. BertHANK: hierarchical attention networks with enhanced knowledge and pre-trained model for answer selection
20. China's ‘Zero-Enemy Policy' in the Gulf
21. Dual attention mechanism network for lung cancer images super-resolution
22. DMalNet: Dynamic malware analysis based on API feature engineering and graph learning
23. A novel deep framework for dynamic malware detection based on API sequence intrinsic features
24. China and Türkiye's Strategic Cooperation in the 21st Century: A 'Complex Role' Prism.
25. Sprelog: Log-Based Anomaly Detection with Self-matching Networks and Pre-trained Models
26. Graph Attention Convolutional Network with Motion Tempo Enhancement for Skeleton-Based Action Recognition
27. URTracker: Unauthorized Reader Detection and Localization Using COTS RFID
28. On Eliminating Blocking Interference of RFID Unauthorized Reader Detection
29. R-TDBF: An Environmental Adaptive Method for RFID Redundant Data Filtering
30. China's partnership diplomacy in the Middle East
31. Association between MAPK and PI3K/Akt signaling pathway‐related gene polymorphisms and migraine.
32. China’s Military Diplomacy towards Arab Countries in Africa’s Peace and Security : The Case of Djibouti
33. A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher
34. Categorising and Comparing Cluster-Based DPA Distinguishers
35. Sprelog: Log-Based Anomaly Detection with Self-matching Networks and Pre-trained Models
36. Graph Attention Convolutional Network with Motion Tempo Enhancement for Skeleton-Based Action Recognition
37. URTracker: Unauthorized Reader Detection and Localization Using COTS RFID
38. Objects as Extreme Points
39. AFRICOM’s military base in Djibouti
40. DTrap:A cyberattack-defense confrontation technique based on Moving Target Defense
41. LWVN:A Lightweight Virtual Network View Method to Defend Lateral Movement
42. A Behavior-Based Method for Distinction of Flooding DDoS and Flash Crowds
43. Detecting Flooding DDoS Under Flash Crowds Based on Mondrian Forest
44. China and the Middle East security governance in the new era
45. AdaptParse: Adaptive Contextual Aware Attention Network for Log Parsing via Word Classification
46. Uncertain? No, It’s Very Certain! : Recovering the Key from Guessing Entropy Enhanced CPA
47. Enhanced Correlation Power Analysis by Biasing Power Traces
48. An Improved NPCUSUM Method with Adaptive Sliding Window to Detect DDoS Attacks
49. Group Verification Based Multiple-Differential Collision Attack
50. Research on Security Algorithm of Virtual Machine Live Migration for KVM Virtualization System
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.