Author of the publication

A Novel Immune-Inspired Method for Malicious Code Extraction and Detection.

, , and . ICAIC (3), volume 226 of Communications in Computer and Information Science, page 501-509. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Maximum-Likelihood Deformation Analysis of Different-Sized Fingerprints., , , and . AVBPA, volume 2688 of Lecture Notes in Computer Science, page 421-428. Springer, (2003)Evaluating Persistent Memory Range Indexes: Part Two., , , and . Proc. VLDB Endow., 15 (11): 2477-2490 (2022)Face Recognition with Relative Difference Space and SVM., , , and . ICPR (3), page 527-531. IEEE Computer Society, (2006)Automatic Fingerprint Identification Using Cluster Algorithm., , , and . ICPR (2), page 398-401. IEEE Computer Society, (2002)A Novel Immune-Inspired Method for Malicious Code Extraction and Detection., , and . ICAIC (3), volume 226 of Communications in Computer and Information Science, page 501-509. Springer, (2011)The Past, Present and Future of Indexing on Persistent Memory., , and . Proc. VLDB Endow., 15 (12): 3774-3777 (2022)Image enhancement and minutiae matching in fingerprint verification., , , and . Pattern Recognit. Lett., 24 (9-10): 1349-1360 (2003)Transformation-Variants Estimation Using Similarity Relative Histogram Grouping Model., and . SINOBIOMETRICS, volume 3338 of Lecture Notes in Computer Science, page 471-480. Springer, (2004)Fingerprint Alignment Using Similarity Histogram., , , and . AVBPA, volume 2688 of Lecture Notes in Computer Science, page 854-861. Springer, (2003)The toolkit and platform for biometric information processing., , , , and . CSCWD (2), page 1059-1064. IEEE Computer Society, (2005)1-84600-002-5.