Skip to main content
Main navigation
Browse
Authors
Collections
Subjects
Contact us
English
العربية
User account menu
Log in
×
Speak Now....
Fulltext search
Media uses External URI
Sort by
Relevance
Views
Title
Author
Date Issued
Order
Asc
Desc
Items per page
20
40
60
80
Search
Advanced Search
1 Result found
Bi-LSTM -- Essays
x
Select all
Search tools
Export to CSV
Save search
Items per page
20
40
60
80
Sort Options
Relevance
Views
Title
Author
Date Issued
Sort Order
ASC
DESC
Grid
List
Select all
Export CSV
Print
-
Article
1
Intrusion Detection Based on Bidirectional Long Short-Term Memory with Attention Mechanism
Yang, Yongjie
University of Bahrain
2023
Intrusion Detection Based on Bidirectional Long Short-Term Memory with Attention Mechanism
Export CSV
Filters
x
Bi-LSTM -- Essays
x
Clear All
Fulltext only
Language
English
(1)
English
(1)
Category
Article
(1)
Article
(1)
Collection
Articles
(1)
Articles
(1)
Subject
Bi-LSTM -- Essays
(1)
(-)
Bi-LSTM -- Essays
(1)
Emergency messages -- Essays
(2)
Emergency messages -- Essays
(2)
Vehicular ad hoc networks -- Essays
(2)
Vehicular ad hoc networks -- Essays
(2)
5G · V2X communication -- Essays
(1)
5G · V2X communication -- Essays
(1)
Adaptive beacons -- Essays
(1)
Adaptive beacons -- Essays
(1)
Attention mechanism -- Essays
(1)
Attention mechanism -- Essays
(1)
Blockchain -- Essays
(1)
Blockchain -- Essays
(1)
Consensus mechanism -- Essays
(1)
Consensus mechanism -- Essays
(1)
convolutional neural network -- Essays
(1)
convolutional neural network -- Essays
(1)
Cross-connected -- Essays
(1)
Cross-connected -- Essays
(1)
Data sharing -- Essays
(1)
Data sharing -- Essays
(1)
Depth-wise separable convolution -- Essays
(1)
Depth-wise separable convolution -- Essays
(1)
Eavesdropper -- Essays
(1)
Eavesdropper -- Essays
(1)
Federated learning -- Essays
(1)
Federated learning -- Essays
(1)
Federated voting classifier -- Essays
(1)
Federated voting classifier -- Essays
(1)
Fog computing -- Essays
(1)
Fog computing -- Essays
(1)
Forwarder selection -- Essays
(1)
Forwarder selection -- Essays
(1)
Geographic routing -- Essays
(1)
Geographic routing -- Essays
(1)
Intrusion detection -- Essays
(1)
Intrusion detection -- Essays
(1)
IoT -- Essays
(1)
IoT -- Essays
(1)
Mobility metrics -- Essays
(1)
Mobility metrics -- Essays
(1)
Multi-hop routing -- Essays
(1)
Multi-hop routing -- Essays
(1)
Performance gain -- Essays
(1)
Performance gain -- Essays
(1)
Physical layer security -- Essays
(1)
Physical layer security -- Essays
(1)
Privacy protection -- Essays
(1)
Privacy protection -- Essays
(1)
Re-configurable intelligent surfaces -- Essays
(1)
Re-configurable intelligent surfaces -- Essays
(1)
Reflecting elements -- Essays
(1)
Reflecting elements -- Essays
(1)
Secret key generation rate -- Essays
(1)
Secret key generation rate -- Essays
(1)
SelectDropout -- Essays
(1)
SelectDropout -- Essays
(1)
Smart grids -- Essays
(1)
Smart grids -- Essays
(1)
Storage optimization -- Essays
(1)
Storage optimization -- Essays
(1)
support vector machine -- Essays
(1)
support vector machine -- Essays
(1)
Theft detection -- Essays
(1)
Theft detection -- Essays
(1)
Vehicle-to-vehicle communications -- Essays
(1)
Vehicle-to-vehicle communications -- Essays
(1)
Show more
Author
Yang, Yongjie
(1)
Yang, Yongjie
(1)
Publisher
University of Bahrain
(1)
University of Bahrain
(1)