Author of the publication

An Empirical Study on Android Malware Characterization by Social Network Analysis.

, , , and . IEEE Trans. Reliab., 73 (1): 757-770 (March 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

COMET: A communication-efficient load balancing strategy for multi-agent cluster computing., , , and . PARCO, page 574-581. Imperial College Press, (1999)iAware: Making Live Migration of Virtual Machines Interference-Aware in the Cloud., , , , , and . IEEE Trans. Computers, 63 (12): 3012-3025 (2014)Designing SSI clusters with hierarchical checkpointing and single I/O space., , , , and . IEEE Concurrency, 7 (1): 60-69 (1999)Multi-View Object Detection by Classifier Interpolation., , , and . ICASSP, page 826-829. IEEE, (2010)Cluster Computing Workshop - Preface/Introduction., , and . PDPTA, CSREA Press, (2000)Data management services and transfer scheme in ChinaGrid., , , and . IJWGS, 3 (4): 447-461 (2007)Performance and energy modeling for live migration of virtual machines., , , , and . HPDC, page 171-182. ACM, (2011)CUDAGA: A Portable Parallel Programming Model for GPU Cluster., , , , , and . CloudCom-Asia, volume 9106 of Lecture Notes in Computer Science, page 203-216. Springer, (2015)LVD: A Lightweight Virtual Desktop Management Architecture., , , and . SVM, volume 18 of Communications in Computer and Information Science, page 25-36. (2008)Disk Failure Prediction in Data Centers via Online Learning., , , , , and . ICPP, page 35:1-35:10. ACM, (2018)