Author of the publication

A Deep Learning Approach to Android Malware Feature Learning and Detection.

, , , and . Trustcom/BigDataSE/ISPA, page 244-251. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cyberspace Security for Future Internet., , , , and . Secur. Commun. Networks, (2018)Mlifdect: Android Malware Detection Based on Parallel Machine Learning and Information Fusion., , , and . Secur. Commun. Networks, (2017)Synergistic Based Social Incentive Mechanism in Mobile Crowdsensing., , and . WASA, volume 10874 of Lecture Notes in Computer Science, page 767-772. Springer, (2018)Few-shot learning for name entity recognition in geological text based on GeoBERT., , , , , and . Earth Sci. Informatics, 15 (2): 979-991 (2022)Dynamic human contact prediction based on naive Bayes algorithm in mobile social networks., , , , and . Softw. Pract. Exp., 50 (11): 2031-2045 (2020)Data Center Heat Monitoring Using Wireless Sensor Networks., and . ACM Southeast Regional Conference, page 59: 1-59: 4. ACM, (2014)Security through Collaboration in MANETs., , and . CollaborateCom, volume 10 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 696-714. Springer / ICST, (2008)A Prediction-Based Fair Replication Algorithm in Structured P2P Systems., , , and . ATC, volume 4610 of Lecture Notes in Computer Science, page 499-508. Springer, (2007)Android app recommendation approach based on network traffic measurement and analysis., , , and . ISCC, page 988-994. IEEE Computer Society, (2015)Trustworthy data management for wireless networks in Cyber-Physical Systems., and . IPCCC, page 1-2. IEEE Computer Society, (2013)