Author of the publication

Review: Build a Roadmap for Stepping Into the Field of Anti-Malware Research Smoothly.

, , , , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Malware Visualization for Fine-Grained Classification., , , , and . IEEE Access, (2018)A Dynamic Detection Method to C/C++ Programs Memory Vulnerabilities Based on Pointer Analysis., , , , and . DASC, page 52-57. IEEE Computer Society, (2013)Review: Build a Roadmap for Stepping Into the Field of Anti-Malware Research Smoothly., , , , and . IEEE Access, (2019)Research on Network Risk Evaluation Method Based on a Differential Manifold., , , , and . IEEE Access, (2020)Blockchain-based Reputation Evaluation Using Game Theory in Social Networking., , , and . BSCI, page 107-114. ACM, (2022)Strengthening LLM ecosystem security: Preventing mobile malware from manipulating LLM-based applications., , , , and . Inf. Sci., (2024)Detection of Malicious Domains in APT via Mining Massive DNS Logs., , , , and . ML4CS (1), volume 12486 of Lecture Notes in Computer Science, page 140-152. Springer, (2020)Cross-Project Software Defect Prediction Based on Feature Selection and Transfer Learning., , and . ML4CS (3), volume 12488 of Lecture Notes in Computer Science, page 363-371. Springer, (2020)APTMalInsight: Identify and cognize APT malware based on system call information and ontology knowledge framework., , , , and . Inf. Sci., (2021)Bypassing software-based remote attestation using debug registers., , , , , , and . Connect. Sci., (2024)