Author of the publication

Leveraging Application Complexity Partition for Android Malware Detection.

, , , , and . CCIS, page 83-88. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Real-time Auto-recognition Method for Pointer-meter under Uneven Illumination., , , and . RCAR, page 890-894. IEEE, (2019)Topology-Guided Perception-Aware Receding Horizon Trajectory Generation for UAVs., , , , , and . IROS, page 3070-3076. (2023)A 3D LiDAR odometry for UGVs using coarse-to-fine deep scene flow estimation., , , and . Trans. Inst. Meas. Control, 45 (2): 274-286 (2023)A Comparative Analysis of Pruning Methods for C4.5 and Fuzzy C4.5., , , and . ICADIWT, volume 277 of Frontiers in Artificial Intelligence and Applications, page 304-312. IOS Press, (2015)Fully Adaptive Framework: Neural Computerized Adaptive Testing for Online Education., , , , , and . AAAI, page 4734-4742. AAAI Press, (2022)Comparative Study on M-Commerce Applications in Various Scenarios., and . Web Intelligence, page 943-946. IEEE Computer Society, (2008)Knowledge-Empowered Automated Negotiation System for B2B e-Commerce., , , and . CEC/EEE, page 192-202. IEEE Computer Society, (2007)Finding Significant Factors on World Ranking of e-Governments by Feature Selection Methods over KPIs., , , , and . SCDS, volume 545 of Communications in Computer and Information Science, page 65-73. Springer, (2015)Classifying Forum Questions Using PCA and Machine Learning for Improving Online CQA., , , and . SCDS, volume 545 of Communications in Computer and Information Science, page 13-22. Springer, (2015)A Logical Model for Detecting Irregular Actions in Physical Access Environment., , and . DEXA Workshops, page 560-564. IEEE Computer Society, (2007)