Author of the publication

Android Malware Identification Through Visual Exploration of Disambly Files.

, and . Int. J. Netw. Secur., 20 (6): 1061-1073 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multiscale Transfer Voting Mechanism: A New Strategy for Domain Adaption., , , , and . IEEE Trans. Ind. Informatics, 17 (10): 7103-7113 (2021)Spatio-Temporal Graph Convolutional Networks via View Fusion for Trajectory Data Analytics., , , , , , and . IEEE Trans. Intell. Transp. Syst., 24 (4): 4608-4620 (April 2023)CA-STD: Scene Text Detection in Arbitrary Shape Based on Conditional Attention., , , , , , , and . Inf., 13 (12): 565 (2022)Adversarial domain adaptation network with pseudo-siamese feature extractors for cross-bearing fault transfer diagnosis., , , , and . Eng. Appl. Artif. Intell., (2022)UBAR: User Behavior-Aware Recommendation with knowledge graph., , , , and . Knowl. Based Syst., (2022)MKD: Mixup-Based Knowledge Distillation for Mandarin End-to-End Speech Recognition., , , , and . Algorithms, 15 (5): 160 (2022)Deep Learning and Visualization for Identifying Malware Families., and . IEEE Trans. Dependable Secur. Comput., 18 (1): 283-295 (2021)Federated Active Learning for Multicenter Collaborative Disease Diagnosis., , , , , , , , and . IEEE Trans. Medical Imaging, 42 (7): 2068-2080 (2023)Clustering Based K-anonymity Algorithm for Privacy Preservation., , and . Int. J. Netw. Secur., 19 (6): 1062-1071 (2017)Privacy Preserving Machine Learning with Homomorphic Encryption and Federated Learning., and . Future Internet, 13 (4): 94 (2021)