Author of the publication

Bidirectional LSTM Malicious webpages detection algorithm based on convolutional neural network and independent recurrent neural network.

, , , , and . Appl. Intell., 49 (8): 3016-3026 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hierarchical part detection with deep neural networks., , , , and . ICIP, page 1933-1937. IEEE, (2016)Single- and cross- database benchmarks for gender classification under unconstrained settings., , , and . ICCV Workshops, page 2152-2159. IEEE Computer Society, (2011)Improved average of synthetic exact filters for precise eye localisation under realistic conditions., , and . IET Biom., 2 (1): 10-20 (2013)Restrictive partially blind signature for resource-constrained information systems., , , , and . Knowl. Inf. Syst., 26 (1): 87-103 (2011)Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism., and . Inf. Sci., 180 (7): 1167-1181 (2010)Certificateless threshold cryptosystem secure against chosen-ciphertext attack., and . Inf. Sci., 177 (24): 5620-5637 (2007)Analysis of Virtual MIMO-Based Cooperative Communication in Femtocell Networks., , and . GLOBECOM, page 1-5. IEEE, (2011)Blocking numbers and fixing numbers of convex bodies.. Discrete Mathematics, 309 (23-24): 6544-6554 (2009)A Novel Unidirectional Proxy Re-Signature Scheme and Its Application for MANETs., and . JCP, 7 (7): 1796-1800 (2012)Practical Certificateless Aggregate Signatures from Bilinear Maps., , , and . J. Inf. Sci. Eng., 26 (6): 2093-2106 (2010)