Author:
Wang Guosai,Zhang Lifei,Xu Wei
Cited by
90 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Anomaly-based error and intrusion detection in tabular data: No DNN outperforms tree-based classifiers;Future Generation Computer Systems;2024-11
2. Bi-LSTM/GRU-based anomaly diagnosis for virtual network function instance;Computer Networks;2024-07
3. SmartOClock: Workload- and Risk-Aware Overclocking in the Cloud;2024 ACM/IEEE 51st Annual International Symposium on Computer Architecture (ISCA);2024-06-29
4. Challenger 2.0: A Step Towards Automated Deployments and Resilient Solutions for the DEBS Grand Challenge;Proceedings of the 18th ACM International Conference on Distributed and Event-based Systems;2024-06-24
5. Investigating Memory Failure Prediction Across CPU Architectures;2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S);2024-06-24