Author of the publication

TransNet: Unseen Malware Variants Detection Using Deep Transfer Learning.

, , , , , and . SecureComm (2), volume 336 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 84-101. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Middleware-based solution for enterprise information integration., , , and . ETFA (2), page 687-690. IEEE, (2001)0-7803-7241-7.Image resampling detection based on texture classification., , , , and . Multimedia Tools Appl., 72 (2): 1681-1708 (2014)Image textural features for steganalysis of spatial domain steganography., , , and . J. Electronic Imaging, 21 (3): 033015 (2012)Performance of distributed consensus time synchronization with Gaussian delay in wireless sensor networks., and . WCNC, page 1998-2002. IEEE, (2009)A novel steganalysis framework of heterogeneous images based on GMM clustering., , , , and . Signal Process. Image Commun., 29 (3): 385-399 (2014)ADWA: A filtering paradigm for signal's noise removal and feature preservation., and . Signal Process., 93 (5): 1172-1191 (2013)Deep learning based online metallic surface defect detection method for wire and arc additive manufacturing., , , , , , and . Robotics Comput. Integr. Manuf., (2023)A closed-loop error compensation method for robotic flank milling., , , and . Robotics Comput. Integr. Manuf., (2020)A Novel Deep Stack-Based Ensemble Learning Approach for Fault Detection and Classification in Photovoltaic Arrays., , , , , , and . Remote. Sens., 15 (5): 1277 (March 2023)Cost constrained spectrum sensing in cognitive radio networks., , and . CISS, page 1-6. IEEE, (2010)