共 200 条
[4]
Abualigah L, 2018, INNOVATIVE COMPUTING, DOI [10.1007/978-3-319-66984-7_18, DOI 10.1007/978-3-319-66984-7_18]
[5]
Code authorship identification using convolutional neural networks
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2019, 95
:104-115
[6]
Selecting System Specific Cybersecurity Attack Patterns using Topic Modeling
[J].
2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE),
2018,
:490-497
[9]
Approaches to Cross-Domain Sentiment Analysis: A Systematic Literature Review
[J].
IEEE ACCESS,
2017, 5
:16173-16192