Please use this identifier to cite or link to this item: https://ah.lib.nccu.edu.tw/handle/140.119/130456
DC FieldValueLanguage
dc.contributor資管系
dc.creator蕭舜文
dc.creatorHsiao, Shun-Wen
dc.creatorHuang, Yi-Ting
dc.creatorChen, Yu-Yuan
dc.creatorYang, Chih-Chun
dc.creatorSun, Yeali S.
dc.creatorChen, Meng Chang
dc.date2019-07
dc.date.accessioned2020-06-24T03:56:03Z-
dc.date.available2020-06-24T03:56:03Z-
dc.date.issued2020-06-24T03:56:03Z-
dc.identifier.urihttp://nccur.lib.nccu.edu.tw/handle/140.119/130456-
dc.format.extent97 bytes-
dc.format.mimetypetext/html-
dc.relationAustralasian Conference on Information Security and Privacy, ACISP
dc.titleTagging a Malware’s Intentions by using Attention-based Sequence-to-Sequence Neural Network
dc.typeconference
item.fulltextWith Fulltext-
item.grantfulltextopen-
item.openairetypeconference-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.cerifentitytypePublications-
Appears in Collections:會議論文
Files in This Item:
File Description SizeFormat
index.html97 BHTML2View/Open
Show simple item record

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.