Author of the publication

Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs.

, , and . TrustCom, page 540-547. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs., , and . TrustCom, page 540-547. IEEE, (2021)Tracing Tor Hidden Service Through Protocol Characteristics., , , and . ICCCN, page 1-9. IEEE, (2022)Breaking Tor's Anonymity by Modifying Cell's Command., , , and . ISCC, page 1-7. IEEE, (2022)Targeted Local Immunization in Scale-Free Peer-to-Peer Networks., , and . J. Comput. Sci. Technol., 22 (3): 457-468 (2007)pXRepository: A Peer-to-Peer XML Repository for Web Service Discovery., , , and . GCC, volume 3251 of Lecture Notes in Computer Science, page 137-144. Springer, (2004)An Encrypted Malicious Traffic Detection System Based on Neural Network., , , and . CyberC, page 62-70. IEEE, (2019)Detection and Analysis of Broken Access Control Vulnerabilities in App-Cloud Interaction in IoT., , , , and . IEEE Internet Things J., 11 (17): 28267-28280 (September 2024)On Efficient Content Matching in Distributed Pub/Sub Systems., , , , and . INFOCOM, page 756-764. IEEE, (2009)Adversarial Seeded Sequence Growing for Weakly-Supervised Temporal Action Localization., , , , , , and . ACM Multimedia, page 738-746. ACM, (2019)Multi-SDN Based Cooperation Scheme for DDoS Attack Defense., , and . SSIC, page 1-7. IEEE, (2018)