Author of the publication

A network security entity recognition method based on feature template and CNN-BiLSTM-CRF.

, , , , , and . Frontiers of IT & EE, 20 (6): 872-884 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Single-Channel ICA-R Method for Speech Signal Denoising combining EMD and Wavelet., , and . JCP, 9 (9): 2082-2090 (2014)A Lightweight Selection Cooperation Protocol with Multiple Available Best Relays., , , and . IEEE Communications Letters, 17 (6): 1172-1175 (2013)Research on Role-Network Model for E-Government Affairs., , and . ITCC (2), page 438-442. IEEE Computer Society, (2005)isbn: 0-7695-2315-3.Exploiting Emotions for Fake News Detection on Social Media., , , , and . CoRR, (2019)A Mobility-Resistant Efficient Clustering Approach for ad hoc and sensor networks., , , and . Mobile Computing and Communications Review, 10 (2): 1-12 (2006)Stability Analysis of PV Generators With Consideration of P&O-Based Power Control., , , and . IEEE Trans. Industrial Electronics, 66 (8): 6483-6492 (2019)SPAD: software protection through anti-debugging using hardware virtualization., , , , , , , , and . SAC, page 623-624. ACM, (2011)ADRC-based Longitudinal Control for Novel Flight Vehicle with Moving Mass., , , , and . CDC, page 601-606. IEEE, (2018)A Recurrent Neural Network Modeling for Automotive Magnetorheological Fluid Shock Absorber., , , , and . ISNN (3), volume 3498 of Lecture Notes in Computer Science, page 890-896. Springer, (2005)Bat-inspired hair sensor., , , and . BioCAS, page 556-559. IEEE, (2016)