Hang, Feilu
19  Ergebnisse:
Personensuche X
?
1

Effective Application of Artificial Intelligence Techniques..:

Hu, Jian ; Zhao, Zhiyu ; Hang, Feilu.
Applied Mathematics and Nonlinear Sciences.  9 (2024)  1 - p. , 2024
 
?
2

Research on the application of network security defence in ..:

Hang, Feilu ; Xie, Linjiang ; Zhang, Zhenhong..
International Journal of Intelligent Networks.  5 (2024)  - p. 101-109 , 2024
 
?
 
?
4

Retraction Note: Artificial intelligence enabled fuzzy mult..:

Hang, Feilu ; Xie, Linjiang ; Zhang, Zhenhong..
Journal of Computer Virology and Hacking Techniques.  19 (2023)  4 - p. 635-635 , 2023
 
?
5

RETRACTED ARTICLE: Artificial intelligence enabled fuzzy mu..:

Hang, Feilu ; Xie, Linjiang ; Zhang, Zhenhong..
Journal of Computer Virology and Hacking Techniques.  19 (2022)  2 - p. 257-269 , 2022
 
?
6

AdaBoost Algorithm in Trustworthy Network for Anomaly Intru..:

Guo, Wei ; Luo, Zhenyu ; Chen, Hexiong...
Applied Mathematics and Nonlinear Sciences.  8 (2022)  1 - p. 1819-1830 , 2022
 
?
7

Learning Representations Using RNN Encoder-Decoder for Edge..:

Guo, Wei ; Chen, Hexiong ; Hang, Feilu...
Computational Intelligence and Neuroscience.  2022 (2022)  - p. 1-8 , 2022
 
?
8

Random Fourier Approximation of the Kernel Function in Prog..:

Guo, Wei ; He, Yue ; Chen, Hexiong...
Applied Mathematics and Nonlinear Sciences.  8 (2022)  1 - p. 1831-1840 , 2022
 
?
9

Design and Development of Interior Design CAD System Based ..:

, In: Cyber Security Intelligence and Analytics; Lecture Notes on Data Engineering and Communications Technologies,
Peng, Yun ; Hang, Feilu - p. 270-277 , 2022
 
?
10

Research on Data Security Protection System of Monitoring a..:

, In: Advances in Artificial Intelligence and Security; Communications in Computer and Information Science,
Xie, Linjiang ; Hang, Feilu ; Lv, Yao. - p. 502-513 , 2021
 
?
11

A Secure Real-time Internal and External Network Data Excha..:

, In: 2020 International Symposium on Computer Engineering and Intelligent Communications (ISCEIC),
Qi, Zhenfei ; Wu, Yi ; Hang, Feilu.. - p. 184-187 , 2020
 
?
12

A data security exchange method based on automatic arrangem..:

Qi, Zhenfei ; Zhang, Fuhua ; Hang, Feilu..
Journal of Physics: Conference Series.  1651 (2020)  1 - p. 012047 , 2020
 
?
13

Accelerating Public Key Cryptography in Android Platforms:

, In: 2019 5th International Conference on Big Data Computing and Communications (BIGCOM),
Ou, Wei ; Fang, Ning ; Xian, Hequn... - p. 245-249 , 2019
 
?
14

G-Key: An Authentication Technique for Mobile Devices Based..:

, In: 2019 IEEE International Conference on Power Data Science (ICPDS),
Xie, Linjiang ; Xian, Hequn ; Tang, Xuyue... - p. 126-129 , 2019
 
?
15

Impact of strategy-neutral rewarding on the evolution of co..:

Liu, Jinzhuo ; Li, Tong ; Wang, Wei..
Chaos, Solitons & Fractals.  106 (2018)  - p. 76-79 , 2018
 
1-15