The following publications are possibly variants of this publication:
- Energy-aware and Machine Learning-based Resource Provisioning of In-Memory Analytics on CloudHosein Mohammadi Makrani, Hossein Sayadi, Devang Motwani, Han Wang, Setareh Rafatirad, Houman Homayoun. CLOUD 2018: 517 [doi]
- Deep-Reinforcement-Learning-Based Intrusion Detection in Aerial Computing NetworksJing Tao, Ting Han, Ruidong Li. network, 35(4):66-72, 2021. [doi]
- Intimacy-based Resource Allocation for Network Slicing in 5G via Deep Reinforcement LearningNan He, Song Yang 0002, Fan Li, Xu Chen 0004. network, 35(6):111-118, 2021. [doi]
- Scheduling CPU for GPU-based Deep Learning JobsWencong Xiao, Zhenhua Han, Hanyu Zhao, Xuan Peng, Quanlu Zhang, Fan Yang, Lidong Zhou. CLOUD 2018: 503 [doi]
- Deep-Learning-Based Weak Electromagnetic Intrusion Detection Method for Zero Touch Networks on Industrial IoTTingting Wang, Jianqing Li, Wei Wei, Wei Wang 0077, Kai Fang. network, 36(6):236-242, 2022. [doi]
- Log-based Anomaly Detection Without Log ParsingVan-Hoang Le, Hongyu Zhang. 2021: