Author of the publication

Hawk: Rapid Android Malware Detection Through Heterogeneous Graph Attention Networks.

, , , , , , , , and . IEEE Trans. Neural Networks Learn. Syst., 35 (4): 4703-4717 (April 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic Database by Inconsistency and Morphogenetic Computing., , and . Trans. Computational Collective Intelligence, (2016)Research of the Evaluation Index System of Green Port Based on Analysis Approach of Attribute Coordinate., , and . IFIP TC12 ICIS, volume 510 of IFIP Advances in Information and Communication Technology, page 372-378. Springer, (2017)Introduction to Morphogenetic Computing, , and . Studies in Computational Intelligence Springer, (2017)Demand Pooling in Omnichannel Operations., , , and . Manag. Sci., 68 (2): 883-894 (2022)Short Hierarchical Identity-based Encryption in the Selective-ID Model., , , , and . J. Softw., 8 (7): 1613-1619 (2013)Development and Evaluation of Hardware Obfuscation Benchmarks., , , , , , and . J. Hardw. Syst. Secur., 2 (2): 142-161 (2018)Many-Criteria Evaluation of Infrastructure Investment Priorities for Distribution Network Planning., , , , , , and . IEEE Access, (2020)Event source identification and strength estimation in wireless sensor networks., , , and . ICNSC, page 1-5. IEEE, (2016)An agent-based model to study the market dynamics of perpetual and subscription licensing., , , and . JORS, 66 (5): 845-857 (2015)Study on Updating Algorithm of Attribute Coordinate Evaluation Model., , and . ICIC (3), volume 10363 of Lecture Notes in Computer Science, page 653-662. Springer, (2017)