Author of the publication

SQL Injection Behavior Mining Based Deep Learning.

, , , , and . ADMA, volume 11323 of Lecture Notes in Computer Science, page 445-454. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

gSpider: a New Tool for Data Integration and Visualization., , and . BIOCOMP, page 725. CSREA Press, (2009)OCPAT: an online codon-preserved alignment tool for evolutionary genomic analysis of protein coding sequences., , , , , , and . Source Code for Biology and Medicine, (2007)Practical Collision Attacks against Round-Reduced SHA-3., , , , , and . IACR Cryptology ePrint Archive, (2019)A database and tool, IM Browser, for exploring and integrating emerging gene and protein interaction data for Drosophila., , , , , and . BMC Bioinformatics, (2006)Performance analysis of V-OFDM for acoustic communication along drill strings., , , and . IET Communications, 11 (4): 576-583 (2017)Security Analysis of SKINNY under Related-Tweakey Settings (Long Paper)., , and . IACR Trans. Symmetric Cryptol., 2017 (3): 37-72 (2017)Human Tissue Classification: an In Silico Approach., , and . BIOCOMP, page 654-656. CSREA Press, (2009)Poster: Distinguishing scientific abbreviations and genes in bio-medical literature mining., , and . ICCABS, page 253. IEEE Computer Society, (2011)Security Analysis of SKINNY under Related-Tweakey Settings., , and . IACR Cryptology ePrint Archive, (2016)SQL Injection Behavior Mining Based Deep Learning., , , , and . ADMA, volume 11323 of Lecture Notes in Computer Science, page 445-454. Springer, (2018)