Author of the publication

Detecting Android Malware Based on Extreme Learning Machine.

, , , , , and . DASC/PiCom/DataCom/CyberSciTech, page 47-53. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis on a Secret-Sharing Based Conditional Proxy Re-Encryption Scheme., and . Mob. Networks Appl., 22 (2): 209-215 (2017)Pattern matching and Monte-Carlo simulation mechanism for the game of NoGo., , and . CCIS, page 61-64. IEEE, (2012)Energy Modeling of IoT Mobile Terminals on WiFi Environmental Impacts., , , and . Sensors, 18 (6): 1728 (2018)Analyzing and Disentangling Interleaved Interrupt-Driven IoT Programs., , , and . IEEE Internet Things J., 6 (3): 5376-5386 (2019)IKP-CDIO: exploration and practice on teaching framework of embedding ideological education into engineering curriculum., and . ICEEL, page 185-190. ACM, (2021)Detecting Android Malware Based on Extreme Learning Machine., , , , , and . DASC/PiCom/DataCom/CyberSciTech, page 47-53. IEEE Computer Society, (2017)Simulation of Improved Fourth-Order Colpitts Oscillator., , , and . Int. J. Online Eng., 9 (3): 93-97 (2013)A Hybrid Collaborative Filtering Model with Deep Structure for Recommender Systems., , , , , and . AAAI, page 1309-1315. AAAI Press, (2017)Modeling the Impacts of WiFi Signals on Energy Consumption of Smartphones., , and . CollaborateCom, volume 252 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 88-97. Springer, (2017)Generation of Adversarial Malware Based on Genetic Algorithm and Instruction Replacement., , , , and . CNIOT, page 936-942. ACM, (2023)