Author of the publication

Anomaly Intrusion Detection Approach Using Hybrid MLP/CNN Neural Network.

, , , and . ISDA (2), page 1095-1102. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance analysis of uplink MIMO MC-CDMA systems based on linear zero-forcing V-BLAST algorithm., and . Science in China Series F: Information Sciences, 51 (9): 1305-1318 (2008)On the Performance of V-BLAST Detectors in MIMO MT-CDMA Uplink over Multipath Fading Channel., and . ICN, page 6. IEEE Computer Society, (2007)Universal Chroma Subsampling Strategy for Compressing Mosaic Video Sequences With Arbitrary RGB Color Filter Arrays in H.264/AVC., , , and . IEEE Trans. Circuits Syst. Video Techn., 23 (4): 591-606 (2013)Reversible data hiding for depth maps using the depth no-synthesis-error model., , and . Inf. Sci., (2014)Steganalysis against substitution-based linguistic steganography based on context clusters., , , , and . Computers & Electrical Engineering, 37 (6): 1071-1081 (2011)An Optical Detector for Determining Chlorophyll and Nitrogen Concentration Based on Photoreaction in Apple Tree Leaves., , , and . Intelligent Automation & Soft Computing, 21 (3): 409-421 (2015)The quasi-arithmetic intuitionistic fuzzy OWA operators., and . Knowl.-Based Syst., (2012)Crank-Nicolson difference scheme for the coupled nonlinear Schrödinger equations with the Riesz space fractional derivative., , and . J. Comput. Physics, (2013)The Research Progress of Bnu Group on Relative Widths., , and . IJWMIP, 7 (6): 803-811 (2009)Personalized E-Advertisement and Experience: Recommending User Targeted Ads., , , , , and . ICEBE, page 56-61. IEEE Computer Society, (2015)