Search

Your search keyword '"Sun, Degang"' showing total 259 results

Search Constraints

Start Over You searched for: Author "Sun, Degang" Remove constraint Author: "Sun, Degang"
259 results on '"Sun, Degang"'

Search Results

2. PromptSAM+: Malware Detection based on Prompt Segment Anything Model

3. Mitigating the Impact of Malware Evolution on API Sequence-based Windows Malware Detector

4. ASGNet: Adaptive Semantic Gate Networks for Log-Based Anomaly Diagnosis

5. Kairos: Practical Intrusion Detection and Investigation using Whole-system Provenance

7. On eliminating blocking interference of RFID unauthorized reader detection system

9. Hierarchical Graph Convolutional Skeleton Transformer for Action Recognition

11. Rethinking the Misalignment Problem in Dense Object Detection

12. Objects as Extreme Points

13. Rethinking the Misalignment Problem in Dense Object Detection

16. ITAR: A Method for Indoor RFID Trajectory Automatic Recovery

17. R-TDBF: An Environmental Adaptive Method for RFID Redundant Data Filtering

18. On Eliminating Blocking Interference of RFID Unauthorized Reader Detection

24. China and Türkiye's Strategic Cooperation in the 21st Century: A 'Complex Role' Prism.

25. Sprelog: Log-Based Anomaly Detection with Self-matching Networks and Pre-trained Models

26. Graph Attention Convolutional Network with Motion Tempo Enhancement for Skeleton-Based Action Recognition

27. URTracker: Unauthorized Reader Detection and Localization Using COTS RFID

31. Association between MAPK and PI3K/Akt signaling pathway‐related gene polymorphisms and migraine.

33. A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher

34. Categorising and Comparing Cluster-Based DPA Distinguishers

38. Objects as Extreme Points

42. A Behavior-Based Method for Distinction of Flooding DDoS and Flash Crowds

43. Detecting Flooding DDoS Under Flash Crowds Based on Mondrian Forest

46. Uncertain? No, It’s Very Certain! : Recovering the Key from Guessing Entropy Enhanced CPA

47. Enhanced Correlation Power Analysis by Biasing Power Traces

48. An Improved NPCUSUM Method with Adaptive Sliding Window to Detect DDoS Attacks

49. Group Verification Based Multiple-Differential Collision Attack

50. Research on Security Algorithm of Virtual Machine Live Migration for KVM Virtualization System

Catalog

Books, media, physical & digital resources