Author of the publication

A Comprehensive Study of Learning-based Android Malware Detectors under Challenging Environments.

, , , , , and . ICSE, page 12:1-12:13. ACM, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Image restoration via exponential scale mixture-based simultaneous sparse prior., , and . IET Image Process., 16 (12): 3268-3283 (2022)MSST-Net: A Multi-Scale Adaptive Network for Building Extraction from Remote Sensing Images Based on Swin Transformer., and . Remote. Sens., 13 (23): 4743 (2021)Joint Prediction of Breast Cancer Histological Grade and Ki-67 Expression Level Based on DCE-MRI and DWI Radiomics., , , , , , and . IEEE J. Biomed. Health Informatics, 24 (6): 1632-1642 (2020)Human-Like Obstacle Avoidance Trajectory Planning and Tracking Model for Autonomous Vehicles That Considers the Driver's Operation Characteristics., , , , and . Sensors, 20 (17): 4821 (2020)Power allocation of jamming attackers against PEV charging stations: A game theoretical approach., , and . SoCPaR, page 111-116. IEEE, (2015)Multi-Robot Task Allocation Using Abandoned-Undertaking Algorithm., and . ICNC (4), page 404-408. IEEE Computer Society, (2008)View Vertically: A Hierarchical Network for Trajectory Prediction via Fourier Spectrums., , , , , , , and . ECCV (22), volume 13682 of Lecture Notes in Computer Science, page 682-700. Springer, (2022)Maintaining Data Freshness in Distributed Real-Time Databases., , and . ECRTS, page 251-260. IEEE Computer Society, (2004)Dynamic Power-Aware Disk Storage Management in Database Servers., , , , and . DEXA (2), volume 9828 of Lecture Notes in Computer Science, page 315-325. Springer, (2016)Web Service Information Mining and Correlation Calculation Method Study., , , , , , and . CloudComp, volume 142 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 204-215. Springer, (2014)